- ECDSA asks users to generate not merely a random long-term secret key, but also a new random secret session key \(r\) for each message to be signed.
- If r becomes public and assuming \(H(R,A,M)\mod\ell \neq 0\).
- The long-term secret key \(a\) can be simply computed as:
\(a=(S-r)/H(R,A,M)\mod\ell\).
- If the same value \(r\) is ever used for 2 different messages the secret key can be computed as well.
- This failure had occured in Sony's ECDSA implementation for code-signing for the PS3.