State minimization in MuSig2 signing sessions

Posted by real-or-random

Mar 7, 2024/10:44 UTC

The discussion revolves around a specific vulnerability concerning the handling of Partially Signed Bitcoin Transactions (PSBTs). This vulnerability emerges when a PSBT is manipulated by introducing mutations that do not affect the output of the NonceGen function. The core of this issue lies in how nonce generation for signing transactions can be exploited under certain conditions.

An attacker initiates the exploit by sending a PSBT to the victim. Upon receiving this, the victim generates a secondary nonce (secnonce) and proceeds to sign the transaction with it. The attacker then claims that there was an error and resends the same PSBT, albeit with some mutations that crucially do not alter the outcome of the NonceGen function. Consequently, the victim unknowingly generates the identical secnonce as before and signs the transaction again.

This scenario underscores a critical security flaw because the re-generation of the same secnonce for different versions of the same PSBT—assuming these versions are perceived distinct due to their mutations—can compromise the integrity of the transaction process. This method of attack highlights the need for robust mechanisms to detect and mitigate such vulnerabilities, ensuring that nonce generation processes are secure against manipulation attempts that aim to exploit the predictability of nonce outcomes based on unchanged parameters.

Link to Raw Post
Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback