Bitcoin Forum
May 10, 2024, 08:28:36 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Mental note: ensure EC crypto is not susceptible to side channel attacks  (Read 1256 times)
Mike Hearn (OP)
Legendary
*
expert
Offline Offline

Activity: 1526
Merit: 1129


View Profile
February 25, 2011, 10:18:36 AM
 #1

For people working on mobile clients:

   http://threatpost.com/en_us/blogs/attack-can-extract-crypto-keys-mobile-device-signals-021611

OpenSSL has apparently been balanced to try and avoid this type of attack. I don't know about crypto++ or Bouncy Castle.
"The nature of Bitcoin is such that once version 0.1 was released, the core design was set in stone for the rest of its lifetime." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715329716
Hero Member
*
Offline Offline

Posts: 1715329716

View Profile Personal Message (Offline)

Ignore
1715329716
Reply with quote  #2

1715329716
Report to moderator
1715329716
Hero Member
*
Offline Offline

Posts: 1715329716

View Profile Personal Message (Offline)

Ignore
1715329716
Reply with quote  #2

1715329716
Report to moderator
0x6763
Guest

February 25, 2011, 02:49:24 PM
 #2

I suspect Bouncy Castle doesn't, or at least I didn't see any comments about it in the Bouncy Castle source code yet.  I've mostly only looked at the EC code, though.  What does OpenSSL do to try to avoid this type of attack?
Mike Hearn (OP)
Legendary
*
expert
Offline Offline

Activity: 1526
Merit: 1129


View Profile
February 25, 2011, 03:38:15 PM
 #3

All operations are constant time. I don't know if you have to do more than that to be safe from power/rf analysis too.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!