Overview
Explore the vulnerabilities in ECDSA signatures and their real-world implications in this 45-minute presentation from the Workshop on Attacks in Cryptography 2 (WAC2). Delve into lattice attacks, cryptanalysis techniques, and the consequences of weak implementations. Examine case studies including the Dark Wallet compromise and random number generation vulnerabilities. Investigate countermeasures, implicit assumptions, and the fragility of cryptographic systems under human error. Gain insights into memory-unsafe code, shared 32-bit signatures, and other critical issues affecting cryptographic security in practice.
Syllabus
Intro
ECDSA
Lattice constructions
Limiting behavior
Variants
Cryptography
Cryptanalysis
Details
Repeated Nonce K values
Results
Why are people doing this
Dark Wallet compromise
Random number generation vulnerabilities
Small knots
More fun
Shared 32bit signatures
What is this
Memory unsafe code
Memory wallets
Countermeasure
Implicit assumptions
Fragility under human error
Questions
Taught by
TheIACR