Double Public Key Signing Function Oracle Attack on EdDSA Software Implementations

08/29/2023
by   Sam Grierson, et al.
0

EdDSA is a standardised elliptic curve digital signature scheme introduced to overcome some of the issues prevalent in the more established ECDSA standard. Due to the EdDSA standard specifying that the EdDSA signature be deterministic, if the signing function were to be used as a public key signing oracle for the attacker, the unforgeability notion of security of the scheme can be broken. This paper describes an attack against some of the most popular EdDSA implementations, which results in an adversary recovering the private key used during signing. With this recovered secret key, an adversary can sign arbitrary messages that would be seen as valid by the EdDSA verification function. A list of libraries with vulnerable APIs at the time of publication is provided. Furthermore, this paper provides two suggestions for securing EdDSA signing APIs against this vulnerability while it additionally discusses failed attempts to solve the issue.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/08/2018

Cryptanalysis of a One-Time Code-Based Digital Signature Scheme

In this paper, we consider a one-time digital signature scheme recently ...
research
02/01/2019

Key Recovery Attack on Rank Quasi-Cyclic Code-based Signature Scheme

Rank Quasi-Cyclic Signature (RQCS) is a rank metric code-based signature...
research
12/01/2021

Security issues of CFS-like digital signature algorithms

We analyse the security of some variants of the CFS code-based digital s...
research
03/23/2022

Winternitz stack protocols

This paper proposes and evaluates a new bipartite post-quantum digital s...
research
08/30/2021

A New Lever Function with Adequate Indeterminacy

The key transform of the REESSE1+ asymmetrical cryptosystem is Ci = (Ai ...
research
09/02/2020

A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party

A (t,n)-threshold signature scheme enables distributed signing among n p...
research
05/12/2022

Stalloris: RPKI Downgrade Attack

We demonstrate the first downgrade attacks against RPKI. The key design ...

Please sign up or login with your details

Forgot password? Click here to reset