Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ec_mult.h: add minimal countermeasure against power-monitoring attack. #192

Closed
wants to merge 2 commits into from

Conversation

dot-asm
Copy link
Collaborator

@dot-asm dot-asm commented Sep 20, 2023

It's argued that [batches of] multiplications by zero can be discerned by monitoring the power and possibly even electromagnetic radiation. Since [otherwise constant-time] operations on infinity points perform batches of multiplications by zero, they could be used to identify sequences of zero bits in the secret key. To minimize the leakage, always pass non-infinity points to point operations and mask the throw-away results.

It's argued that [batches of] multiplications by zero can be discerned
by monitoring the power and possibly even electromagnetic radiation.
Since [otherwise constant-time] operations on infinity points perform
batches of multiplications by zero, they could be used to identify
sequences of zero bits in the secret key. To minimize the leakage,
always pass non-infinity points to point operations and mask the
throw-away results.
@dot-asm
Copy link
Collaborator Author

dot-asm commented Oct 9, 2023

Merged [after a fuzzing round].

@dot-asm dot-asm closed this Oct 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant