How Does a Collision in a Hash Function Affect ECDSA Security?

A hash collision occurs when two different inputs produce the same hash output. If an attacker finds a collision, they could potentially replace a legitimate transaction with a malicious one that has the same hash.

Since the ECDSA signature is created on the hash, the valid signature for the legitimate transaction would also be valid for the malicious one. While collision resistance in modern functions like SHA-256 is extremely high, a successful collision attack would fundamentally break the non-repudiation guarantee of ECDSA.

How Does the Size of the Hash Digest Affect the Security of the Signature?
What Is a Hash Collision and Why Is a 256-Bit Output Size Considered Resistant to It?
What Is a ‘Pre-Image Attack’ and How Does It Relate to Collision Resistance?
How Does the Elliptic Curve Digital Signature Algorithm (ECDSA) Relate to Public Key Security?
How Does Elliptic Curve Digital Signature Algorithm (ECDSA) Protect against Preimage Attacks?
What Is a Hash Collision and Is It a Threat to Blockchain Security?
How Is the Concept of a “Hash Collision” a Theoretical Security Risk for Merkle Trees?
What Is the Risk of a Hash Collision in a Signed Contract?

Glossar