[148524] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] RSA Key Extraction via Low-Bandwidth Acoustic

daemon@ATHENA.MIT.EDU (Werner Koch)
Thu Dec 19 11:30:56 2013

X-Original-To: cryptography@metzdowd.com
From: Werner Koch <wk@gnupg.org>
To: Alexandre Anzala-Yamajako <anzalaya@gmail.com>
Date: Thu, 19 Dec 2013 12:22:23 +0100
In-Reply-To: <CAHE9jN20aeUZ22wMt9Vspo19mOH4+HDY4hi61WtLXoX5utJwBg@mail.gmail.com>
	(Alexandre Anzala-Yamajako's message of "Thu, 19 Dec 2013 01:19:13
	+0100")
Cc: Tamzen Cannoy <tamzen@cannoy.org>, Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On Thu, 19 Dec 2013 01:19, anzalaya@gmail.com said:

> Have you trief this out against openssl ? How succesful do you think it
> would be ?

OpenSSL seems not to be vulnerable.  The reason is that OpenSSL uses
Montgomery multiplication which protects against this concrete attack.
The attack is based on the specific way GnuPG switches between Karatsuba
and simple multiplication.


Shalom-Salam,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post