YoVDO

Biased Nonce Sense - Lattice Attacks Against Weak ECDSA Signatures in the Wild

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Cryptanalysis Courses

Course Description

Overview

Explore the vulnerabilities in ECDSA signatures and their real-world implications in this 45-minute presentation from the Workshop on Attacks in Cryptography 2 (WAC2). Delve into lattice attacks, cryptanalysis techniques, and the consequences of weak implementations. Examine case studies including the Dark Wallet compromise and random number generation vulnerabilities. Investigate countermeasures, implicit assumptions, and the fragility of cryptographic systems under human error. Gain insights into memory-unsafe code, shared 32-bit signatures, and other critical issues affecting cryptographic security in practice.

Syllabus

Intro
ECDSA
Lattice constructions
Limiting behavior
Variants
Cryptography
Cryptanalysis
Details
Repeated Nonce K values
Results
Why are people doing this
Dark Wallet compromise
Random number generation vulnerabilities
Small knots
More fun
Shared 32bit signatures
What is this
Memory unsafe code
Memory wallets
Countermeasure
Implicit assumptions
Fragility under human error
Questions


Taught by

TheIACR

Related Courses

Applied Cryptography
University of Virginia via Udacity
Cryptography II
Stanford University via Coursera
Coding the Matrix: Linear Algebra through Computer Science Applications
Brown University via Coursera
Cryptography I
Stanford University via Coursera
Unpredictable? Randomness, Chance and Free Will
National University of Singapore via Coursera