|国家预印本平台
首页|Breaking ECDSA with Two Affinely Related Nonces

Breaking ECDSA with Two Affinely Related Nonces

Breaking ECDSA with Two Affinely Related Nonces

来源:Arxiv_logoArxiv
英文摘要

The security of the Elliptic Curve Digital Signature Algorithm (ECDSA) depends on the uniqueness and secrecy of the nonce, which is used in each signature. While it is well understood that nonce $k$ reuse across two distinct messages can leak the private key, we show that even if a distinct value is used for $k_2$, where an affine relationship exists in the form of: \(k_m = a \cdot k_n + b\), we can also recover the private key. Our method requires only two signatures (even over the same message) and relies purely on algebra, with no need for lattice reduction or brute-force search(if the relationship, or offset, is known). To our knowledge, this is the first closed-form derivation of the ECDSA private key from only two signatures over the same message, under a known affine relationship between nonces.

Jamie Gilchrist、William J. Buchanan、Keir Finlow-Bates

数学

Jamie Gilchrist,William J. Buchanan,Keir Finlow-Bates.Breaking ECDSA with Two Affinely Related Nonces[EB/OL].(2025-04-18)[2025-05-25].https://arxiv.org/abs/2504.13737.点此复制

评论