YoVDO

Biased Nonce Sense - Lattice Attacks Against Weak ECDSA Signatures in the Wild

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Cryptanalysis Courses

Course Description

Overview

Explore the vulnerabilities in ECDSA signatures and their real-world implications in this 45-minute presentation from the Workshop on Attacks in Cryptography 2 (WAC2). Delve into lattice attacks, cryptanalysis techniques, and the consequences of weak implementations. Examine case studies including the Dark Wallet compromise and random number generation vulnerabilities. Investigate countermeasures, implicit assumptions, and the fragility of cryptographic systems under human error. Gain insights into memory-unsafe code, shared 32-bit signatures, and other critical issues affecting cryptographic security in practice.

Syllabus

Intro
ECDSA
Lattice constructions
Limiting behavior
Variants
Cryptography
Cryptanalysis
Details
Repeated Nonce K values
Results
Why are people doing this
Dark Wallet compromise
Random number generation vulnerabilities
Small knots
More fun
Shared 32bit signatures
What is this
Memory unsafe code
Memory wallets
Countermeasure
Implicit assumptions
Fragility under human error
Questions


Taught by

TheIACR

Related Courses

Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam
Classical Cryptosystems and Core Concepts
University of Colorado System via Coursera
Cryptography and Information Theory
University of Colorado System via Coursera
Cryptography And Network Security
Indian Institute of Technology, Kharagpur via Swayam
An Introduction to Cryptography
Coventry University via FutureLearn