TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A Vulnerability in Implementations of SHA-3, Shake, EdDSA

185 pointsby stateabout 2 years ago

8 comments

makeworldabout 2 years ago
This is over 4 months old, and is already patched in Python. Was discussed on HN at the time: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33281106" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=33281106</a>
评论 #35052082 未加载
harveywiabout 2 years ago
It may be helpful to give this vulnerability a name, contributing to public awareness of the issue. For example, The SHA-Shake Redemption.
eulgroabout 2 years ago
I didn&#x27;t read the whole paper, but how can this even happen? Seems like the buffer overflow would be triggered for any file larger than 4 GiB, which I assume someone has tested in the 8 years since it was released.
评论 #35051085 未加载
评论 #35053563 未加载
评论 #35051368 未加载
评论 #35053980 未加载
red_admiralabout 2 years ago
To clarify, this only affects EdDSA as far as implementations use SHA-3 to hash a message before applying the signature. The actual elliptic curve operations code seems to be fine.
jonstewartabout 2 years ago
&gt; partialBlock = (unsigned int)(dataByteLen - i);<p>The paper makes no mention of compiler warnings… but shouldn’t this cast trigger a compiler warning?
评论 #35052159 未加载
评论 #35051648 未加载
eterevskyabout 2 years ago
I wonder if this could be avoided by writing the canonical implementations in Rust or better yet in some system with formal verification.<p>This is such a critical part of the software stack, that we need a more reliable way of validation than just a bunch of people staring at the code written in C.
评论 #35053966 未加载
评论 #35053973 未加载
rurbanabout 2 years ago
I find the current polynonce attack much worse: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35048431" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35048431</a>
Donckeleabout 2 years ago
Is this due to stupidity or malice?<p>I just can’t get my head round the idea that software written and reviewed by experts and submitted to the “National Institute of Standards and Technology” with a budget of 1 billion dollars can fuck up this way.<p>I’m no mathematician but I would have thought implementing pure number crunching code is not rocket science.<p>Buffer overflow, overwrite memory, run arbitrary code, seriously? LOL, WTF.
评论 #35052491 未加载
评论 #35054263 未加载
评论 #35052390 未加载