Skip to content

kaeptnjoda/ecdsaPredictableNonce

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 

Repository files navigation

ecdsaPredictableNonce

Breaks an ecdsa implementation that uses privKey xor message as nonce. Recovering the full private key requires 512 signatures. In other words, every signature leaks 0.5 bit. It is probable that the attack can be refined such that each signature leaks 1 bit. An detailed explanation of the attack can be found in the explanation.pdf.

main.go is the implementation of an attack specifically against a vulnerable version of github.com/obscuren/secp256k1-go. The obvious fix is to use the operating system's PRNG to generate the nonce just like the original project by haltingstate.

About

Breaks ecdsa using `privKey xor message` as nonce.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 83.5%
  • TeX 16.0%
  • Makefile 0.5%