[148524] in cryptography@c2.net mail archive
Re: [Cryptography] RSA Key Extraction via Low-Bandwidth Acoustic
daemon@ATHENA.MIT.EDU (Werner Koch)
Thu Dec 19 11:30:56 2013
X-Original-To: cryptography@metzdowd.com
From: Werner Koch <wk@gnupg.org>
To: Alexandre Anzala-Yamajako <anzalaya@gmail.com>
Date: Thu, 19 Dec 2013 12:22:23 +0100
In-Reply-To: <CAHE9jN20aeUZ22wMt9Vspo19mOH4+HDY4hi61WtLXoX5utJwBg@mail.gmail.com>
(Alexandre Anzala-Yamajako's message of "Thu, 19 Dec 2013 01:19:13
+0100")
Cc: Tamzen Cannoy <tamzen@cannoy.org>, Cryptography <cryptography@metzdowd.com>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
On Thu, 19 Dec 2013 01:19, anzalaya@gmail.com said:
> Have you trief this out against openssl ? How succesful do you think it
> would be ?
OpenSSL seems not to be vulnerable. The reason is that OpenSSL uses
Montgomery multiplication which protects against this concrete attack.
The attack is based on the specific way GnuPG switches between Karatsuba
and simple multiplication.
Shalom-Salam,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography