If I understand the paper correctly, they are suggesting that ECDSA is often implemented so that if you supply the same key, the code will calculate the same nonce & you can track that calculation to leak the nonce & therefore the secret key used by the other party. So simply connecting with the same ECDSA parameters is sufficient?
Crap.
Crap crap.
Crap crap crap crap crap.
game over man, game over.
Good grief. VOIP / video conferencing leaking your secret keys !
Provided you use them 91 times to sign the same message, if I am reading this correctly.
If I understand the paper correctly, they are suggesting that ECDSA is often implemented so that if you supply the same key, the code will calculate the same nonce & you can track that calculation to leak the nonce & therefore the secret key used by the other party. So simply connecting with the same ECDSA parameters is sufficient?
Urgh.