A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency
2020
IACR Transactions on Symmetric Cryptology
We present attacks on the cryptography formerly used in the IOTA blockchain, including under certain conditions the ability to forge signatures. We developed practical attacks on IOTA's cryptographic hash function Curl-P-27, allowing us to quickly generate short colliding messages. These collisions work even for messages of the same length. Exploiting these weaknesses in Curl-P-27, we broke the EUCMA security of the former IOTA Signature Scheme (ISS). Finally, we show that in a chosen-message
doi:10.13154/tosc.v2020.i3.367-391
dblp:journals/tosc/HeilmanNTLCVD20
fatcat:4flxxmbivbf5pdbe5l4k5hck4q