-
Notifications
You must be signed in to change notification settings - Fork 43
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
apply RSA-CRT hardening for PKCS1 sign operations; use eqaf for comparing cstructs in constant time #15
Conversation
the remaining |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not really aware about powm_sec
and pown
and I did not get the real diff between them on my side with bechamel
(and see how many times they need to compute same arguments). But according the documentation, it seems ok!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks! Just a small metadata remark.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would like to review this more in-depth, but here's my feedback so far :)
rebased on master and force-pushed |
Just found this, which does not sound so good: https://lists.lysator.liu.se/pipermail/nettle-bugs/2016/003104.html
# Z.powm_sec (Z.of_int 2) (Z.of_int 2) (Z.of_int 2);;
Exception: Invalid_argument "Z.powm_sec: modulus must be odd". This is (and other things like |
- PKCS1 sign verifies that the computed signature is a valid signature (see Arjen Lenstra 1996, Florian Weimer 2015 https://people.redhat.com/~fweimer/rsa-crt-leaks.pdf) - other RSA operations (including decrypt / PSS / ..): extend with optional `rsa_crt_hardening:bool` argument (defaulting to false)
I removed the usage of |
No description provided.