Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <933f5586e2b664ab5fe6a7ce40c741bb92e2e412.camel@markhack.com>
Date: Mon, 30 Jan 2023 13:58:34 -0600
From: Mark Hack <markhack@...khack.com>
To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com>
Subject: Re: Data operand dependent timing on Intel and Arm
 CPUs


The blinding I have seen was for RSA 
https://www.openssl.org/docs/man1.1.1/man3/RSA_blinding_on.html and at
least for ECDSA signatures

For symmetric keys such as AES which are mostly table lookup and XOR
based, I have not seen any blinding.



Regards

Mark Hack

On Mon, 2023-01-30 at 14:13 -0500, Demi Marie Obenour wrote:
> On Mon, Jan 30, 2023 at 10:43:16AM -0600, Mark Hack wrote:
> > This is a concern, but if you look into the crypto implementations,
> > data blinding is applied to mitigate both instruction and power
> > side
> > channel attacks
> 
> Can you provide examples?  I have never seen blinding used for
> symmetric
> cryptography outside of embedded systems.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.