Главная
Study mode:
on
1
Intro
2
ECDSA
3
Lattice constructions
4
Limiting behavior
5
Variants
6
Cryptography
7
Cryptanalysis
8
Details
9
Repeated Nonce K values
10
Results
11
Why are people doing this
12
Dark Wallet compromise
13
Random number generation vulnerabilities
14
Small knots
15
More fun
16
Shared 32bit signatures
17
What is this
18
Memory unsafe code
19
Memory wallets
20
Countermeasure
21
Implicit assumptions
22
Fragility under human error
23
Questions
Description:
Explore the vulnerabilities in ECDSA signatures and their real-world implications in this 45-minute presentation from the Workshop on Attacks in Cryptography 2 (WAC2). Delve into lattice attacks, cryptanalysis techniques, and the consequences of weak implementations. Examine case studies including the Dark Wallet compromise and random number generation vulnerabilities. Investigate countermeasures, implicit assumptions, and the fragility of cryptographic systems under human error. Gain insights into memory-unsafe code, shared 32-bit signatures, and other critical issues affecting cryptographic security in practice.

Biased Nonce Sense - Lattice Attacks Against Weak ECDSA Signatures in the Wild

TheIACR
Add to list