Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 19 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
A dead attack is an attack on an establishment event that occurs after the [key-state](/concept/key-state "Key state is the complete set of currently authoritative keypairs for an AID plu...") for that event has become stale because a later establishment event has rotated both the signing keys and pre-rotated keys to new sets, rendering the attack ineffective due to the forward security properties of KERI's key rotation mechanism.
A dead attack represents a specific temporal attack vector in the KERI protocol where an adversary attempts to exploit an establishment event after its associated cryptographic key-state has become stale. The key-state becomes stale when a subsequent establishment event has successfully rotated both the current signing keypairs and the pre-rotated keypairs to entirely new key sets.
The term "dead" signifies that the attack targets cryptographic material that has been superseded by newer keys through rotation, making the attack inherently limited in effectiveness. This is a fundamental security property of KERI's key management architecture: once keys have been rotated forward, attacks on events using the old key-state cannot compromise the current or future security of the AID.
Key properties of dead attacks:
Scope and boundaries:
Dead attacks are distinguished from live attacks, which target current signing keys or pre-rotated keys before they have been rotated. The boundary between dead and live attacks is precisely defined by the moment a rotation event successfully establishes new key-state. Before rotation: live attack. After rotation: dead attack.
Implementations should detect dead attacks through:
To maximize dead attack protection:
Validators must:
While dead attack protection is strong, implementations must also:
The concept of dead attacks emerges from the broader cryptographic principle of forward security (also called forward secrecy), which has been a concern in key management systems since the 1990s. Traditional PKI systems suffer from a fundamental vulnerability: if a private key is compromised, all past signatures and encrypted messages using that key become suspect or exposed.
In blockchain-based identity systems, key compromise typically results in permanent loss of control over the identifier, as there is no mechanism to prove that a rotation event was authorized by the legitimate controller versus an attacker who compromised the keys. This creates a binary security model: either keys are secure (system works) or keys are compromised (system fails).
Traditional key rotation schemes in administrative PKI systems rely on certificate revocation lists (CRLs) or Online Certificate Status Protocol (OCSP) to invalidate compromised keys, but these mechanisms:
KERI's approach to dead attacks is fundamentally different from traditional systems, leveraging its unique pre-rotation mechanism and KEL (Key Event Log) architecture to provide cryptographic proof that an attack occurred after keys were rotated.
The pre-rotation scheme is KERI's primary defense against both live and dead attacks. Each establishment event includes a cryptographic commitment (digest) to the next set of rotation keys. These next keys are:
When a rotation occurs, the previously hidden keys are revealed and used to sign the rotation event, and new hidden keys are committed for the next rotation. This creates a forward chain of cryptographic commitments that cannot be forged retroactively.
Once a rotation has occurred, an attacker who compromises the old signing keys faces insurmountable cryptographic barriers:
KEL immutability: The KEL is an append-only log. The attacker cannot remove or modify the rotation event that superseded their compromised keys.
Witness consensus: Witnesses have already signed receipts for the rotation event, creating distributed proof of the key-state change.
First-seen immutability: The first-seen policy means honest witnesses and watchers will reject any conflicting events using the old keys.
Cryptographic binding: The rotation event is cryptographically bound to the previous event through hash chaining, making it impossible to insert forged events.
If an attacker attempts a dead attack by creating a forked KEL using compromised old keys, KERI's duplicity detection mechanisms immediately identify the attack:
The attacker's forked KEL is provably duplicitous - it conflicts with the witnessed, legitimate KEL. Validators can cryptographically verify which KEL is authoritative by checking witness signatures and the KAACE consensus algorithm.
KERI's pre-rotation mechanism provides post-quantum security against dead attacks. Even if a future quantum computer could break the cryptographic algorithms used for the old keys, the attacker still cannot:
This makes dead attacks not just difficult but cryptographically impossible to execute successfully, even with future computational advances.
The dead attack concept provides important security guarantees for KERI-based systems:
Temporal security boundaries: System designers can reason about security in temporal phases. Once a rotation occurs, all previous key material is cryptographically "dead" for attack purposes. This enables:
Forward security: Past events remain secure even if current keys are compromised. An attacker gaining access to today's keys cannot:
High-security environments: Organizations requiring strong key management can implement aggressive rotation schedules, knowing that each rotation creates a new security boundary. For example:
Compromise recovery: If an organization suspects key compromise, immediate rotation transforms any potential live attack into a dead attack, neutralizing the threat without requiring identifier replacement.
Long-lived identifiers: AIDs intended to persist for years or decades benefit from dead attack protection. Even if keys from 2025 are compromised in 2035, they cannot be used to forge events or impersonate the controller, because multiple rotations have occurred in the interim.
Operational complexity: While dead attack protection is automatic in KERI, it requires:
Recovery limitations: Dead attack protection does not help if:
Verification overhead: Validators must:
However, these trade-offs are generally favorable compared to traditional systems, which offer no cryptographic protection against retrospective key compromise and require trust in centralized infrastructure for revocation checking.
The dead attack concept demonstrates KERI's sophisticated approach to key management security. By combining pre-rotation, KEL immutability, witness consensus, and duplicity detection, KERI creates a system where attacks on old key material are not just difficult but cryptographically provable as illegitimate. This provides forward security guarantees that are impossible in traditional PKI systems and difficult to achieve even in blockchain-based identity systems.