Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

RSA implementation vulnerable to timing attack+incorrect #4

Open
wbl opened this issue Nov 1, 2016 · 1 comment
Open

RSA implementation vulnerable to timing attack+incorrect #4

wbl opened this issue Nov 1, 2016 · 1 comment

Comments

@wbl
Copy link

wbl commented Nov 1, 2016

The RSA implementation in os/rsa.c uses the Chinese Remainder Theorem without blinding to efficiently decrypt. This introduces a timing attack, slightly different from the published one, where the variance of the runtime as a function of the argument to the reduction leaks the private components of the key. The standard countermeasure is blinding.

Handbook of Applied Cryptography states Barrett reduction potentially requires two subtractions at the end, not just the one performed in the code.

@evangreen
Copy link
Collaborator

Thanks. I will study this one and come back with more info.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants