|
Message-ID: <933f5586e2b664ab5fe6a7ce40c741bb92e2e412.camel@markhack.com> Date: Mon, 30 Jan 2023 13:58:34 -0600 From: Mark Hack <markhack@...khack.com> To: oss-security@...ts.openwall.com, Solar Designer <solar@...nwall.com> Subject: Re: Data operand dependent timing on Intel and Arm CPUs The blinding I have seen was for RSA https://www.openssl.org/docs/man1.1.1/man3/RSA_blinding_on.html and at least for ECDSA signatures For symmetric keys such as AES which are mostly table lookup and XOR based, I have not seen any blinding. Regards Mark Hack On Mon, 2023-01-30 at 14:13 -0500, Demi Marie Obenour wrote: > On Mon, Jan 30, 2023 at 10:43:16AM -0600, Mark Hack wrote: > > This is a concern, but if you look into the crypto implementations, > > data blinding is applied to mitigate both instruction and power > > side > > channel attacks > > Can you provide examples? I have never seen blinding used for > symmetric > cryptography outside of embedded systems.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.