1
0
mirror of https://github.com/Mbed-TLS/mbedtls.git synced 2025-11-05 08:10:38 +03:00
Files
mbedtls/library
Janos Follath d65df1fa67 ECDSA: Fix side channel vulnerability
The blinding applied to the scalar before modular inversion is
inadequate. Bignum is not constant time/constant trace, side channel
attacks can retrieve the blinded value, factor it (it is smaller than
RSA keys and not guaranteed to have only large prime factors). Then the
key can be recovered by brute force.

Reducing the blinded value makes factoring useless because the adversary
can only recover pk*t+z*N instead of pk*t.
2019-10-25 09:11:21 +01:00
..
2019-02-11 21:13:33 +00:00
2019-04-24 10:51:54 +02:00
2019-07-10 18:35:10 +03:00
2019-04-24 10:51:54 +02:00
2018-07-23 18:18:32 +01:00
2019-09-06 13:27:00 +01:00
2019-04-24 10:51:54 +02:00
2019-10-25 09:11:21 +01:00
2019-07-08 15:44:18 +02:00
2019-04-24 10:51:54 +02:00
2019-04-24 10:51:54 +02:00
2018-11-06 13:12:47 +00:00
2019-04-24 10:51:54 +02:00
2015-09-04 14:21:07 +02:00
2015-09-04 14:21:07 +02:00
2019-04-24 10:51:54 +02:00
2019-04-24 10:51:54 +02:00
2017-10-29 17:53:52 +02:00
2018-10-25 16:07:16 +01:00
2019-06-20 16:33:02 +01:00
2018-10-07 17:48:37 +01:00