Tangem Wallet Pack of 2 - Secure Crypto Wallet - Trusted Cold Storage for Bitcoin, Ethereum, NFT's &

Tangem Wallet Pack of 2 - Secure Crypto Wallet - Trusted Cold Storage for Bitcoin, Ethereum, NFT's &
Key item features Ultimate Security: Generates a private key that remains on the card, safeguarding crypto and NFTs from hackers with EAL6+ certification and audited firmware. Versatile Compatibility: Manages over 13,000 tokens across 70+ blockchains, supporting DeFi, NFTs, and DeEx without wires, Bluetooth, or USB. Effortless Operation: Utilizes NFC for secure transactions via a mobile device and the Tangem app, enabling buying and selling crypto with various payment methods. Smart Backup: Features a second Tangem Wallet as a backup, eliminating the need for paper, pictures, or seed phrases for recovery. Durable Design: Boasts IP68 protection against environmental conditions, ensuring longevity and robust physical security. Comprehensive Support: Compatible with Bitcoin, Ethereum, Solana, XRP, USDT, and over 6,000 cryptocurrencies, integrating with dApps and WalletConnect.

LBANK

How does the Related Key Attack on Schnorr Signatures work in real life?

We know that Schnorr signature is applied this way:

Key Generation

  • Define curve ( E ), field ( F_q ), order ( N ), generator ( G ), and hash ( h ).
  • Private key: ( d in (0, N) ), Public key: ( P = dG ).

Signing

  1. Random ( k in (1, N) ), compute ( R = kG ).
  2. ( c = h(R || M) ), ( s = (k + d * c) % N ).
  3. Signature: ( (R, s) ).

Verification

  • Compute ( c = h(R || M) ) and check ( sG = R + cP ).
  • Valid if true.

Related-key attack:

A Related Key Attack targets the Schnorr signature scheme by exploiting additive modifications to public keys.

If an attacker has a valid signature ( (R, s) ) for a public key ( P ), they can generate another valid signature ( (R, s + ac) ) for a related public key ( P + aG ), where ( a ) is a scalar. Thus, public keys generated via additive changes are vulnerable, as the attacker can forge valid signatures.

My doubt

What I don't understand is how this attack works in a real scenario. What should an attacker actually do?

The attacker must hope to find a victim with the exact public key ( P + aG ). The attacker cannot arbitrarily choose this public key. While the attacker can modify the scalar ( a ), it is dependent on the original public key ( P ), so the victim public key cannot be selected freely.

So, how does this attack manifest in the real world? Am I missing something here?



from Recent Questions - Bitcoin Stack Exchange https://ift.tt/CJj8qQu
via IFTTT

Popular posts from this blog

Crypto Exec Warns Tokenization Is Moving Faster Than Expected

Bitcoin Mining Could Be Strengthening The Ruble, Russian Central Bank Says

Nigerian SEC Partners With Police To Tackle Crypto Ponzi Schemes – Details