Post
Topic
Board Bitcoin Discussion
Re: Mini-puzzle for puzzle #130
by
ActiveC
on 15/12/2024, 13:00:54 UTC
Yes, you should have some understanding of ECDSA signature vulnerabilities.
2 most common vulnerabilities are repetitions of K for the same private key and weak K
We have only 2 signed messages and their signature r does not match, only the weak K remains.
I checked 02/03838db77b981db321faf527a830461cfda01aed50d85c345a7b0a8f4e5e4fd3fc in the 80-bit range it is not there.
sha256 from the message also does not reveal r, as well as double hashing.
The rabbit hole is too deep. I'm tired))

6 signatures in total, not only 2, you find another 4 on the blockchain Smiley LLL ?!

7

Enlighten us please, 2 been here on the forum, another 4 can be extracted from the withdrawal tx, which is he 7th?!

The one that allowed the private key to be searched, e.g. the first tx out.

Yes, true, still not enough for Lattice attack, unless some weak K, which RetiredCoder affirmed it is not!

Who knows any other signature vulnerabilities which can be exploited with a small number of R,S,Z pairs?