Introduction In this blog post, we tell a tale of how we discovered a novel attack against ECDSA and how we applied it to datasets

Introduction In this blog post, we tell a tale of how we discovered a novel attack against ECDSA and how we applied it to datasets
Most security experts are by now aware of the threat that the rise of quantum computing poses to modern cryptography. Shor’s quantum algorithm, in particular,
ING (Dutch bank) recently released their own implementation of the popular Gennaro-Goldfeder’18 Threshold ECDSA signature scheme in the form of a library written in Rust.
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.
During an internal project pertaining to automated cryptographic testing, we discovered that many implementations don’t respect standard specifications, especially signature algorithms. Let us take a