Abstract:
The implementation of the so called duplicate signature key selection attack on different digital signature schemes is discussed. We discuss also the usage of this attack for breaking some cryptographic protocols based on vulnerable signature schemes. Countermeasures for preventing this attack at the scheme-level and protocol-level are considered also.