Question: [ 3 0 ] 3 . In class, we have covered a Digital Signature Algorithm ( DSA ) , in which the signature ( r

[30]3. In class, we have covered a Digital Signature Algorithm (DSA), in which the signature (r,s) for
the message m can be computed as
r=(gk,modp),modq
s=k-1(H(m)+x*r),modq
where k is a random private key per signing, x is long-term private key and H is a cryptographic hash
function.
A. Consider a variant of DSA algorithm, in which the second component of the signature
generation is computed as
s=k-1(m+x*r),modq
Show that this variant is not secure, in which the attacker can forge valid signature for
any arbitrary message of it choice without querying any signatures from the signer.
B. Sony PS3 was hacked by the hacker group "failoOverflow" via a key recovery attack on
the ECDSA digital signatures computed in Sony PS3 platform. Explain what caused the
attack and show the steps of the attack in details.
 [30]3. In class, we have covered a Digital Signature Algorithm (DSA),

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!