chelsea h. komlo je proslijedio/a tweet korisnika/ceCas Cremers
Alternatively: Let PK be the victim’s pub key and G be the generator, where PK=sG (s is the secret). Attack: 1. Pick a t modulo the order of G, 2. Compute G’ = (t^(-1))*P, 3. Publish a cert where the public key is PK and the generator is G’. Success when PK is validated but not Ghttps://twitter.com/CasCremers/status/1217385258208940033 …
chelsea h. komlo je dodan/na,
Cas Cremers @CasCremers
1. Find an ecc root cert C with pk
2. Apply Vaudenay|(Pornin&Stern) 2004 get C' with sk',params' for that pk
3. Create a normal code signing cert C'' with key pair (pk'',sk'') and sign software with sk''
4. Sign C'' with sk'
5. Present software,C'',C' to windows' sigcheck64.exe
Prikaži ovu nit
13:36 - 16. sij 2020.
0 replies
0 proslijeđenih tweetova
2 korisnika označavaju da im se sviđa
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.