1. 22 6月, 2018 5 次提交
  2. 21 6月, 2018 2 次提交
  3. 20 6月, 2018 1 次提交
  4. 19 6月, 2018 3 次提交
  5. 13 6月, 2018 1 次提交
    • M
      Add blinding to an ECDSA signature · a3e9d5aa
      Matt Caswell 提交于
      Keegan Ryan (NCC Group) has demonstrated a side channel attack on an
      ECDSA signature operation. During signing the signer calculates:
      
      s:= k^-1 * (m + r * priv_key) mod order
      
      The addition operation above provides a sufficient signal for a
      flush+reload attack to derive the private key given sufficient signature
      operations.
      
      As a mitigation (based on a suggestion from Keegan) we add blinding to
      the operation so that:
      
      s := k^-1 * blind^-1 (blind * m + blind * r * priv_key) mod order
      
      Since this attack is a localhost side channel only no CVE is assigned.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      a3e9d5aa
  6. 08 6月, 2018 1 次提交
  7. 04 6月, 2018 3 次提交
  8. 31 5月, 2018 2 次提交
  9. 30 5月, 2018 1 次提交
  10. 29 5月, 2018 2 次提交
  11. 25 5月, 2018 2 次提交
  12. 24 5月, 2018 2 次提交
  13. 23 5月, 2018 1 次提交
  14. 18 5月, 2018 1 次提交
  15. 09 5月, 2018 2 次提交
  16. 08 5月, 2018 1 次提交
  17. 01 5月, 2018 1 次提交
  18. 27 4月, 2018 1 次提交
  19. 24 4月, 2018 6 次提交
  20. 23 4月, 2018 1 次提交
  21. 17 4月, 2018 1 次提交