Hi,
Quote:
[Originally Posted by ZaiRoN;67554]The title says all. Enjoy the paper by Evilcry:
http://www.reteam.org/papers/e77.pdf |
I'm not sure what to make of this. Perhaps I am missing something. Is the author claiming he can forge signatures? Otherwise, it appears he is reversing a Big Integer/ECC package. There is no need for that - we can get the stuff open source.
I'd be interested in reading a paper on forging signatures and RE (ECDSA for example). But I don't believe it is feasible at the moment.
In a Signature Scheme, the document to be signed goes through three steps. The most important of which is:
Decrypt the message (the actual plain text or hash of the plain text) as if it were an instance of cipher text.
Since this is decryption, it uses the Private Key.
Verification would use the Public Key. Depending on whether the the SS used Appendix or Recovery, the original plain text (or hash) would be presented to the verifier function (Appendix); or the message would be pulled from the signature and presented to the verifier function (Recovery). Again, the verifier function uses the Public Key.
So, to forge a message, the adversary would need the Private Key. The Private Key is not exposed in the software, since the software only needs the Public Key for verification. In addition, if the Signature System supports Recovery, the original message does not need to be present either.
Finally, when using ECC, the curve is of little importance presuming you are using recommended curves. For our discussion, one could use NIST P192 or P256. What is important is the point on the curve one chooses. This should be kept secret.
Jeff