1. 14 Aug, 2018 6 commits
  2. 11 Aug, 2018 1 commit
  3. 10 Aug, 2018 3 commits
  4. 07 Aug, 2018 1 commit
  5. 01 Aug, 2018 9 commits
  6. 26 Jul, 2018 3 commits
  7. 25 Jul, 2018 1 commit
  8. 23 Jul, 2018 1 commit
  9. 22 Jul, 2018 1 commit
  10. 13 Jul, 2018 1 commit
  11. 03 Jul, 2018 1 commit
  12. 28 Jun, 2018 1 commit
  13. 25 Jun, 2018 1 commit
  14. 24 Jun, 2018 1 commit
  15. 21 Jun, 2018 4 commits
  16. 19 Jun, 2018 1 commit
  17. 18 Jun, 2018 3 commits
  18. 13 Jun, 2018 1 commit
    • Matt Caswell's avatar
      Add blinding to an ECDSA signature · 949ff366
      Matt Caswell authored
      
      
      Keegan Ryan (NCC Group) has demonstrated a side channel attack on an
      ECDSA signature operation. During signing the signer calculates:
      
      s:= k^-1 * (m + r * priv_key) mod order
      
      The addition operation above provides a sufficient signal for a
      flush+reload attack to derive the private key given sufficient signature
      operations.
      
      As a mitigation (based on a suggestion from Keegan) we add blinding to
      the operation so that:
      
      s := k^-1 * blind^-1 (blind * m + blind * r * priv_key) mod order
      
      Since this attack is a localhost side channel only no CVE is assigned.
      
      Reviewed-by: default avatarRich Salz <rsalz@openssl.org>
      949ff366