Ethereum: Transaction Malleability in the blockchain
Ethereum: Understand the malleability of transactions in the blockchain
The Ethereum blockchain, built on the open source platform of Ethereum (ETH), is known for its advanced smart contract and its decentralized governance model. However, an essential aspect that has aroused significant concern among users and developers is the malleability of transactions. In this article, we will immerse ourselves on the functioning of a malleability of transactions in the Ethereum blockchain, to explore examples and discuss potential implications.
What is the malleability of transactions?
Malleability transactions refer to the ability of minors on the Ethereum network to handle transactions without being detected by other nodes. This means that a malicious node can create or modify transactions without modifying their digital signatures, which makes it difficult for others to detect and prevent such activities. The objective of the malleability of transactions is to allow payments resistant to censorship and decentralized.
How does the malleability of transactions work in Ethereum work?
Here is an overview of the process:
- Creation of transactions : When a user initiates a transaction on the Ethereum network, he is broadcast to the pool of minors.
- Verification : The minors collect several copies of the transaction (called blocks) and check them using complex algorithms and cryptographic techniques.
- Signature of transactions : The verified transactions are then signed with digital signatures, which are unique combinations of private keys and public addresses.
- Creation of blocks : A block is created by combining a group of verified transactions, as well as other metadata such as the hatching of the previous block and a horoding.
Types of malleability of transactions
There are two main types of transaction malleability in Ethereum:
- Poisoning : This happens when several copies of a single transaction are created simultaneously, which makes it difficult to detect any malicious activity.
- Spreading : In this scenario, minors create additional blocks with the same transactions without modifying their digital signatures.
Examples of transactions malleability
Although the malleability of the transactions is a property inherent in blockchain technology, there have been cases where exploits have been successfully carried out:
- The Dao Hack (2016) : A group of malicious actors created several copies of an intelligent contract which tried to steal funds from the Ethereum DAO (decentralized autonomous organization). This feat was finally detected by the network and interrupted.
- ERC-20 tokens with vulnerability of reentrance : In 2020, researchers discovered vulnerabilities in several ERC-20 tokens, allowing attackers to reintegrate the contract and drain the funds without authorization.
Potential implications
The malleability of transactions presents significant risks for the Ethereum ecosystem:
- Financial losses : The potential for massive financial loss due to malicious transactions can have a training effect on the entire network.
- Safety presentations : The malleability of transactions can also lead to security vulnerabilities, as attackers can use the weaknesses of the system.
The attenuation of malleability transactions
To approach the malleability of transactions, developers and Ethereum users work together:
- Improvement of cryptographic algorithms : more secure cryptographic techniques, such as those used in the ECDHE algorithm (Diffique-Hellman curve), can be used to improve the safety of transactions.
- Surveillance of the Node : Regular surveillance of the activity of the nodes can help to detect suspicious models and to prevent malicious transactions.
Conclusion
The malleability of transactions is an essential aspect of the architecture of Ethereum blockchain, but it also presents significant risks for the network.