Blog

Sep 02, 2025

The Dark Side of Deterministic Signatures

In accordance with standards like RFC 8032 and FIPS 186-5, this section describes the Edwards-Curve Digital Signature Algorithm (EdDSA), emphasizing its deterministic nature and verification procedure. Adversaries can use EdDSA's deterministic signature to recover the secret key by presenting two distinct public keys, according to a new double public key signing oracle attack that the authors have discovered. Because of this, EdDSA's strong unforgeability guarantees are effectively broken, allowing for arbitrary message signing. This vulnerability's wide range and importance are highlighted by the fact that many popular cryptographic libraries are among the affected implementations.

Source: HackerNoon →


Share

BTCBTC
$109,417.00
0.89%
ETHETH
$3,929.80
0.44%
USDTUSDT
$1.00
0.01%
BNBBNB
$1,079.36
2.33%
XRPXRP
$2.46
3.32%
SOLSOL
$186.05
0.08%
USDCUSDC
$1.000
0.01%
STETHSTETH
$3,926.91
0.41%
TRXTRX
$0.321
0.38%
DOGEDOGE
$0.197
1.13%
ADAADA
$0.655
1.34%
WSTETHWSTETH
$4,780.00
0.35%
WBTCWBTC
$109,333.00
1.13%
WBETHWBETH
$4,240.57
0.48%
FIGR_HELOCFIGR_HELOC
$0.997
2.6%
LINKLINK
$18.49
7.91%
USDEUSDE
$0.999
0.06%
WEETHWEETH
$4,239.38
0.44%
XLMXLM
$0.321
1.44%
HYPEHYPE
$37.38
0.72%