You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Future work for a better merkelized storage is planned in #156. This is relatively large work. Before we do that we would still face problems with an existing implementation of Merkle hash merging:
Two merging rules are provided, one is mostly for debugging purposes.
The current implementation is potentially vulnerable to 2nd preimage attack: different combinations of merging hashes produce the same digest function input. (While it is impossible for the current implementation because the lengths of the merged hashes are always the same, these lengths are not validated.)
These problems would not require huge efforts to resolve them so they might be resolved prior to #156.
Proposed change
To leave the only one merging rule.
To rewrite hash merging either validating the lengths or prepending the hashes with the lengths, thus preventing the most straightforward 2nd preimage attack scenario.
The text was updated successfully, but these errors were encountered:
Motivation
Future work for a better merkelized storage is planned in #156. This is relatively large work. Before we do that we would still face problems with an existing implementation of Merkle hash merging:
These problems would not require huge efforts to resolve them so they might be resolved prior to #156.
Proposed change
The text was updated successfully, but these errors were encountered: