Ethereum: Birthday attack on P2SH – Security vulnerability while tracking
As one of the most popular and most used platforms of blockchain, Ethereum was a pioneer in implementing the varite transactation of safety feays. Howver, an existing speaker, there is a variant of your payment protocol 2 (P2), specifically related to Konso HE. Also painting as binday attacks, this weakness is a significant thing is safety and integrity
Algorithm Hash160
HASH160 is an algorithm developed by RIPEMD, it is a protocol integrity Rimann with algorithmic design design (Mashed-up). Primarily uses bitcoin and one similar crate of diigital? HASH160 algorithm is used to verify integrity and authenticity, which is applied to P2SH transactions on Ethereum.
Birthday vulnerability *
A birthday attack uses vulnerability in a particular feature that certain values of HeA are more likely to precipitate what. To put it simply, the specific input (“birthday”) has multiputs. By choosing input and deduction analysis, attackers can deduce sensitive information about others ”
In the case of Ethereum, this vulnerability can be used by using Malicus’s act as HASH160 algorithm on the same HE password or phrase key. If they are successful, they can potentially release ballet funds or get unauthorized checks.
Influence and mitigation
The vulnerability of birthday attacks is relatively new and has been discovered at Varium Forks and implementation. To mitigate this risk:
1.
- Due Hash Rainfall : Make sure the HASH160 is designed with collision -resistant properties, it is a rod antacker torability.
- Regular security audits
: regularly performing safety audits when implementing eterum to determine the effectiveness of the position.
Conclusion *
While the vultack vulnerability against P2SH transactions in Etherum can compare with other security problems with the development and testing of efforts to ensure that blockchain platforms continue to remain. When developers and users continue to the borders of what are posts in The Eares, it remains vigilant for the potential.
By understanding, taking steps to alleviate its influence, we can work with mothers who create more D in Ethereum.