Introduction In this blog post, we tell a tale of how we discovered a novel attack against ECDSA and how we applied it to datasets
Tag: ECDSA
Quantum Attack Resource Estimate: Using Shor’s Algorithm to Break RSA vs DH/DSA VS ECC
Most security experts are by now aware of the threat that the rise of quantum computing poses to modern cryptography. Shor’s quantum algorithm, in particular,
Audit of ING’s Threshold ECDSA Library – And a dangerous vulnerability in existing Gennaro-Goldfeder’18 implementations
ING (Dutch bank) recently released their own implementation of the popular Gennaro-Goldfeder’18 Threshold ECDSA signature scheme in the form of a library written in Rust.
How to defeat Ed25519 and EdDSA using faults
We’ve succesfully conducted a fault attack against EdDSA that allowed us to recover enough secret key material to produce fake signatures for any message in a way a verifier cannot detect.
How (not) to break your (EC)DSA
During an internal project pertaining to automated cryptographic testing, we discovered that many implementations don’t respect standard specifications, especially signature algorithms. Let us take a