Naziv
|
Signature Spoofing by Key Recreation
|
Sažetak
|
An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
|
Preduvjeti
|
An authoritative signer is using a weak method of random number generation or weak signing software that causes key leakage or permits key inference.|An authoritative signer is using a signature algorithm with a direct weakness or with poorly chosen parameters that enable the key to be recovered using signatures from that signer.
|
Rješenja
|
Ensure cryptographic elements have been sufficiently tested for weaknesses.
|