MoneroResearch.info |
Macchetti, M. 2023. A Novel Related Nonce Attack for ECDSA. [Cryptology ePrint Archive, Paper 2023/305]. Added by: Jack (3/6/23, 10:25 PM) Last edited by: Jack (3/6/23, 10:35 PM) |
Resource type: Miscellaneous BibTeX citation key: Macchetti2023 View all bibliographic details |
Categories: Not Monero-focused Creators: Macchetti |
Views: 15/2467
|
Attachments nonce attack ECDSA.pdf [4/875] | URLs https://eprint.iacr.org/2023/305 |
Abstract |
We describe a new related nonce attack able to extract the original signing key from a small collection of ECDSA signatures gener- ated with weak PRNGs. Under suitable conditions on the modulo order of the PRNG, we are able to attack linear, quadratic, cubic as well as arbitrary degree recurrence relations (with unknown coefficients) with few signatures and in negligible time. We also show that for any collec- tion of randomly generated ECDSA nonces, there is one more nonce that can be added following the implicit recurrence relation, and that would allow retrieval of the private key; we exploit this fact to present a novel rogue nonce attack against ECDSA. Up to our knowledge, this is the first known attack exploiting generic and unknown high-degree algebraic relations between nonces that do not require assumptions on the value of single bits or bit sequences (e.g. prefixes and suffixes).
|
Notes |
Blog:
https://research.kudelskisecurity.com/2023/03/06/polynonce-a-tale-of-a-novel-ecdsa-attack-and-bitcoin-tears/ Added by: Jack Last edited by: Jack |