A new academic paper describes three types of attacks against linked Ethereum PoS chains

go through&nbspClark

With the binary upgrade of the Ethereum network, the native cryptocurrency of the protocol has reached an unparalleled replacement value. Binary is the next step in the transition of Proof of Stake (PoS) on the Ethereum network. However, a recently submitted white paper explained that a group of pc scientists from Stanford University and the Ethereum Foundation believe that there are 3 attack vectors on the “Proof of Stake Ethereum” blockchain.

The 3 attacks against the Ethereum paper aimed to explain the evidence supported by the proof of stake

The Ethereum network currently has a Proof of Work (PoW) protocol mechanism, which plans to fully transition to the Proof of Stake (PoS) network in time. Recent upgrades, such as Berlin, London, and binaries, are used to assist in the transition to PoS goals. Only in the recent past, when binary was enforced, the value of each ether soared to the unparalleled high of $4,467 per unit of substitution (ATH).

At the same time, the network transfer fee for a typical ether group operation on Saturday morning was as high as $50. More importantly, the US vertical trend from Twitter on Saturday morning indicated that the term “ETH 2.0” became popular. Many people discussing the ETH 2.0 upgrade shared an alternative white paper written by a computer scientist at Stanford University, hence the Ethereum Foundation.

BTC advocate Tuur Demeester shared 2 quotations from the paper on Saturday. These quotations are theoretically, but opponents will attack the chain. The paper called “Three Attacks on Proof-of-Stake Ethereum” was submitted on October 19.

The authors of this white paper are Gaspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas, and David Tse. Basically, the white paper shows that there have been 2 Ethereum network attacks recently, so the author of the paper improved these techniques.

In addition to the major improvements that would theoretically produce “short-range reorganization” and “adversarial network delay”, PC scientists also proposed a third attack.

“Combined with the technology of each refinement attack, we tend to get a third attack that allows opponents with very few shares and no network messaging management (assuming probabilistic messaging instead) to cause even remote protocol chain reorganization,” The author of the paper pointed out. The 3 attacks on the ETH PoS paper added:

Honest but rational or ideologically intent validators may use this attack to expand their profits or delay the agreement, thereby threatening the consistency and security of PoS Ethereum’s incentives. Attacks may also cause congestion in the voting process and lead to protocol instability.

The white paper stated that the attack “also changed the priori malicious actors’ decision to stop the protocol completely”

At the same time, critics of the Ethereum network use this paper to focus on the potential vulnerabilities associated with these attacks once the network transitions to a complete PoS system. Bram Cohen, the founder of the Chia project and creator of Bittorrent, also tweeted about the new research on Saturday.

One of Chia’s advocates responded and told Cohen: “Let’s reply to your tweets within a year to see what Chia has achieved compared to ETH. Please consider your point of view to make community members like me disappear. “The Ethereum attack paper will provide a potential attack related to the Ethereum PoS chain technology, but also provides a solution. The author of the paper believes that these attacks will inspire malicious actors.

The author of the paper concluded: “Our attack also changed a priori malicious actors, which may be ideological intent to delay or even in some cases completely delay the protocol selection.” “The refinement attack in Section 4.2 It provides the adversary with a tool to try and simply do this, even though the adversary cannot manage the message propagation delay (it is assumed to be probabilistic).”


Technical director.

Source link

Recommended For You

About the Author: