Summary

  • Researchers have found a way to deceive commercially available proof systems into verifying false statements, even though the systems, when paired with a particular hash function, have been shown to be secure in a commonly used cryptographic model known as the random oracle model.
  • The random oracle model is used by numerous cryptographic applications, and the flaw demonstrates that such systems need to be reassessed.
  • The researchers targeted a proof system called the GKR protocol, which is used for proving that a computer program produces a certain output when given a secret input, and showed how to embed a malicious program in any task.
  • It remains to be seen whether the newly discovered technique could be used to undermine the security of cryptocurrencies and other applications.
  • The researchers discovered the vulnerability and notified the company that sold the product prior to publication, and a patch has since been issued.

By Erica Klarreich

Original Article