谷歌浏览器插件
订阅小程序
在清言上使用

Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

2023 IEEE 28TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS, CAMAD 2023(2023)

引用 0|浏览10
暂无评分
摘要
EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This paper describes an attack against some of the most popular EdDSA implementations, which results in an adversary recovering the private key used during signing. With this recovered secret key, an adversary can sign arbitrary messages that would be seen as valid by the EdDSA verification function. A list of libraries with vulnerable APIs at the time of publication is provided. Furthermore, this paper provides two suggestions for securing EdDSA signing APIs against this vulnerability while it additionally discusses failed attempts to solve the issue.
更多
查看译文
关键词
Software Implementation,Public Key,Time Of Publication,Secret Key,Elliptic Curve,Security Scheme,Digital Signature,Notion Of Security,Signature Scheme,Hash Function,Base Point,Key Generation,Cryptosystem,Majority Of Applications,Verification Algorithm,Public Parameters,Deterministic Strategy
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要