1. 03 Jul, 2018 1 commit
  2. 28 Jun, 2018 1 commit
  3. 25 Jun, 2018 1 commit
  4. 24 Jun, 2018 1 commit
  5. 21 Jun, 2018 4 commits
  6. 19 Jun, 2018 1 commit
  7. 18 Jun, 2018 3 commits
  8. 13 Jun, 2018 1 commit
    • Matt Caswell's avatar
      Add blinding to an ECDSA signature · 949ff366
      Matt Caswell authored
      
      
      Keegan Ryan (NCC Group) has demonstrated a side channel attack on an
      ECDSA signature operation. During signing the signer calculates:
      
      s:= k^-1 * (m + r * priv_key) mod order
      
      The addition operation above provides a sufficient signal for a
      flush+reload attack to derive the private key given sufficient signature
      operations.
      
      As a mitigation (based on a suggestion from Keegan) we add blinding to
      the operation so that:
      
      s := k^-1 * blind^-1 (blind * m + blind * r * priv_key) mod order
      
      Since this attack is a localhost side channel only no CVE is assigned.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      949ff366
  9. 12 Jun, 2018 1 commit
  10. 09 Jun, 2018 1 commit
  11. 02 Jun, 2018 1 commit
  12. 31 May, 2018 2 commits
  13. 29 May, 2018 1 commit
  14. 23 May, 2018 1 commit
  15. 21 May, 2018 1 commit
  16. 18 May, 2018 1 commit
  17. 17 May, 2018 1 commit
    • Matt Caswell's avatar
      Make BN_GF2m_mod_arr more constant time · 7e5292ba
      Matt Caswell authored
      
      
      Experiments have shown that the lookup table used by BN_GF2m_mod_arr
      introduces sufficient timing signal to recover the private key for an
      attacker with access to cache timing information on the victim's host.
      This only affects binary curves (which are less frequently used).
      
      No CVE is considered necessary for this issue.
      
      The fix is to replace the lookup table with an on-the-fly calculation of
      the value from the table instead, which can be performed in constant time.
      
      Thanks to Youngjoo Shin for reporting this issue.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/6270)
      
      (cherry picked from commit b336ce57)
      7e5292ba
  18. 14 May, 2018 2 commits
  19. 12 May, 2018 3 commits
  20. 11 May, 2018 1 commit
  21. 05 May, 2018 1 commit
  22. 04 May, 2018 2 commits
  23. 03 May, 2018 2 commits
  24. 02 May, 2018 4 commits
  25. 01 May, 2018 2 commits