Clarifications on RSA timing attack CVE-2022-4304

Hubert Kario hkario at redhat.com
Mon Mar 13 12:12:17 UTC 2023


On Saturday, 11 March 2023 04:10:58 CET, Girish Yerra wrote:
> Hi All,
> I am not sure if this is the right forum to discuss the aspects 
> of the CVE. Feel free to close this and point me to the right 
> forum.
>
> I am looking for some more specific details on the attack 
> description. I am mainly looking for some of the details and 
> clarifications.
>
> 1. For timing attacks the popular counter measure is to apply 
> blinding which makes it timing resistant. Does this 
> countermeasure fail in this case?

While blinding protects against a leaky mod-exp implementation, unblinding
still has to be done in constant time manner. That wasn't done.
See some of the discussions in 
https://github.com/openssl/openssl/pull/20281

> 2. What is the order of the trials that an attacker requires to 
> mount this attack ?
>
> Please share any reference paper giving more details of this attack.

We're still working on a paper.

-- 
Regards,
Hubert Kario
Principal Quality Engineer, RHEL Crypto team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 99/71, 612 45, Brno, Czech Republic



More information about the openssl-users mailing list