Skip to main content
Top

2024 | OriginalPaper | Chapter

16. Implementation of EdDSA in the Ethereum Blockchain

Authors : Mamadou Cherif Kasse, El Hadj Modou Mboup

Published in: Mathematics of Computer Science, Cybersecurity and Artificial Intelligence

Publisher: Springer Nature Switzerland

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Blockchain technology is widely used across various domains for its security and distributed ledger capabilities. To secure transactions, most blockchain platforms such as Ethereum employ the Elliptic Curve Digital Signature Algorithm (ECDSA).
However, the use of ECDSA can pose risks, such as the inadvertent exposure of the private key in case of errors, thus facilitating obtaining corresponding signatures for various documents. To address this issue, a solution emerges: the integration of the Edwards-curve Digital Signature Algorithm (EdDSA). By opting for EdDSA to generate transaction signatures, several advantages emerge, such as increased speed, optimal performance, and enhanced independence in random number generation. Indeed, this innovative proposition significantly bolsters security compared to the conventional use of ECDSA, marking a substantial advancement within the Ethereum ecosystem.
Furthermore, we have implemented both algorithms to sign and verify Ethereum transactions to make a performance comparison. The implementation is carried out in Python on an Intel Core i3 processor with 8 GB of RAM and a 64-bit operating system.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference W Mehuron. Digital signature standard (DSS). US department of commerce, national institute of standards and technology (NIST). Information Technology Laboratory (ITL). FIPS PEB, 186, 1994. W Mehuron. Digital signature standard (DSS). US department of commerce, national institute of standards and technology (NIST). Information Technology Laboratory (ITL). FIPS PEB, 186, 1994.
2.
go back to reference Diego F Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom. LadderLeak: Breaking ECDSA with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 225–242, 2020. Diego F Aranha, Felipe Rodrigues Novaes, Akira Takahashi, Mehdi Tibouchi, and Yuval Yarom. LadderLeak: Breaking ECDSA with less than one bit of nonce leakage. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 225–242, 2020.
3.
go back to reference Marcan Bushing. Segher, and sven, PS3 epic fail. In 27th Chaos Communication Congress, 2010. Marcan Bushing. Segher, and sven, PS3 epic fail. In 27th Chaos Communication Congress, 2010.
4.
go back to reference Phong Q Nguyen and Igor E Shparlinski. The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography, 30:201–217, 2003. Phong Q Nguyen and Igor E Shparlinski. The insecurity of the elliptic curve digital signature algorithm with partially known nonces. Designs, codes and cryptography, 30:201–217, 2003.
5.
go back to reference Simon Josefsson and Ilari Liusvaara. Edwards-curve digital signature algorithm (EdDSA). Technical report, 2017. Simon Josefsson and Ilari Liusvaara. Edwards-curve digital signature algorithm (EdDSA). Technical report, 2017.
6.
go back to reference Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77–89, 2012. Daniel J Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. High-speed high-security signatures. Journal of cryptographic engineering, 2(2):77–89, 2012.
8.
go back to reference J Guruprakash and Srinivas Koppu. An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in blockchain and IoT. Informatica, 46(2), 2022. J Guruprakash and Srinivas Koppu. An empirical study to demonstrate that EdDSA can be used as a performance improvement alternative to ECDSA in blockchain and IoT. Informatica, 46(2), 2022.
9.
go back to reference Shaik Johny Basha, Venkata Srinivasu Veesam, Tamminina Ammannamma, Sirisha Navudu, and MVVS Subrahmanyam. Security enhancement of digital signatures for blockchain using EdDSA algorithm. In 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pages 274–278. IEEE, 2021. Shaik Johny Basha, Venkata Srinivasu Veesam, Tamminina Ammannamma, Sirisha Navudu, and MVVS Subrahmanyam. Security enhancement of digital signatures for blockchain using EdDSA algorithm. In 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pages 274–278. IEEE, 2021.
10.
go back to reference Alessandro Barenghi and Gerardo Pelosi. A note on fault attacks against deterministic signature schemes (short paper). In Advances in Information and Computer Security: 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12–14, 2016, Proceedings 11, pages 182–192. Springer, 2016. Alessandro Barenghi and Gerardo Pelosi. A note on fault attacks against deterministic signature schemes (short paper). In Advances in Information and Computer Security: 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12–14, 2016, Proceedings 11, pages 182–192. Springer, 2016.
11.
go back to reference Thomas Pornin. Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). Technical report, 2013. Thomas Pornin. Deterministic usage of the digital signature algorithm (DSA) and elliptic curve digital signature algorithm (ECDSA). Technical report, 2013.
12.
go back to reference Benjamin Black, Joppe W Bos, Craig Costello, Patrick Longa, and Michael Naehrig. Elliptic curve cryptography (ECC) nothing up my sleeve (NUMS) curves and curve generation (2014). Benjamin Black, Joppe W Bos, Craig Costello, Patrick Longa, and Michael Naehrig. Elliptic curve cryptography (ECC) nothing up my sleeve (NUMS) curves and curve generation (2014).
13.
go back to reference Joppe W Bos, Craig Costello, Patrick Longa, and Michael Naehrig. Selecting elliptic curves for cryptography: an efficiency and security analysis. Journal of Cryptographic Engineering, 6:259–286, 2016. Joppe W Bos, Craig Costello, Patrick Longa, and Michael Naehrig. Selecting elliptic curves for cryptography: an efficiency and security analysis. Journal of Cryptographic Engineering, 6:259–286, 2016.
14.
go back to reference Michael Pacheco, Gustavo A Oliva, Gopi Krishnan Rajbahadur, and Ahmed E Hassan. What makes Ethereum blockchain transactions be processed fast or slow? An empirical study. Empirical Software Engineering, 28(2):39, 2023. Michael Pacheco, Gustavo A Oliva, Gopi Krishnan Rajbahadur, and Ahmed E Hassan. What makes Ethereum blockchain transactions be processed fast or slow? An empirical study. Empirical Software Engineering, 28(2):39, 2023.
15.
go back to reference Mastering Ethereum: Building Smart Contracts and DApps, chapter Transactions. O’Reilly Media, 2018. Mastering Ethereum: Building Smart Contracts and DApps, chapter Transactions. O’Reilly Media, 2018.
16.
17.
go back to reference Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1:36–63, 2001.CrossRef Don Johnson, Alfred Menezes, and Scott Vanstone. The elliptic curve digital signature algorithm (ECDSA). International journal of information security, 1:36–63, 2001.CrossRef
18.
go back to reference Adam Langley, Mike Hamburg, and Sean Turner. RFC 7748: Elliptic curves for security. Internet Research Task Force (IRTF), 2016. Adam Langley, Mike Hamburg, and Sean Turner. RFC 7748: Elliptic curves for security. Internet Research Task Force (IRTF), 2016.
19.
go back to reference Ingrid Biehl, Bernd Meyer, and Volker Müller. Differential fault attacks on elliptic curve cryptosystems. In Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings 20, pages 131–146. Springer, 2000. Ingrid Biehl, Bernd Meyer, and Volker Müller. Differential fault attacks on elliptic curve cryptosystems. In Advances in Cryptology—CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings 20, pages 131–146. Springer, 2000.
20.
go back to reference Mathieu Ciet and Marc Joye. Elliptic curve cryptosystems in the presence of permanent and transient faults. Designs, codes and cryptography, 36(1):33–43, 2005.MathSciNetCrossRef Mathieu Ciet and Marc Joye. Elliptic curve cryptosystems in the presence of permanent and transient faults. Designs, codes and cryptography, 36(1):33–43, 2005.MathSciNetCrossRef
21.
go back to reference Yolan Romailler and Sylvain Pelissier. Practical fault attack against the ed25519 and EdDSA signature schemes. In 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 17–24. IEEE, 2017. Yolan Romailler and Sylvain Pelissier. Practical fault attack against the ed25519 and EdDSA signature schemes. In 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC), pages 17–24. IEEE, 2017.
22.
go back to reference Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, and Ruggero Susella. Breaking ed25519 in WolfSSL. In Topics in Cryptology–CT-RSA 2018: The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, April 16–20, 2018, Proceedings, pages 1–20. Springer, 2018. Niels Samwel, Lejla Batina, Guido Bertoni, Joan Daemen, and Ruggero Susella. Breaking ed25519 in WolfSSL. In Topics in Cryptology–CT-RSA 2018: The Cryptographers’ Track at the RSA Conference 2018, San Francisco, CA, USA, April 16–20, 2018, Proceedings, pages 1–20. Springer, 2018.
23.
go back to reference Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, and Paul Rösler. Attacking deterministic signature schemes using fault attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 338–352. IEEE, 2018. Damian Poddebniak, Juraj Somorovsky, Sebastian Schinzel, Manfred Lochter, and Paul Rösler. Attacking deterministic signature schemes using fault attacks. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P), pages 338–352. IEEE, 2018.
Metadata
Title
Implementation of EdDSA in the Ethereum Blockchain
Authors
Mamadou Cherif Kasse
El Hadj Modou Mboup
Copyright Year
2024
DOI
https://doi.org/10.1007/978-3-031-66222-5_16

Premium Partner