Displaying 1 result from an estimated 1 matches for "a0da64ba".
2013 Sep 14
0
ECDSA curve used in new protocol has suspicious seed value
...l be used in the new tinc protocol: ECDSA
According to
https://github.com/gsliepen/tinc/blob/1.1/src/openssl/ecdsagen.c you use
the secp521r1 curve, which is derived (according to
http://www.secg.org/collateral/sec2_final.pdf - page 18) from the seed
value "D09E8800 291CB853 96CC6717 393284AA A0DA64BA". There is suspicion
around, that this seed value might weaken a ECDSA curve (as it is not
explained where it actually comes from and how/why it was selected) to an
attack not yet known to the public, chosen potentially by brute force to
make this attack easier.
Unfortunately, there is no alt...