Constant-Time Callees with Variable-Time Callers
https://eprint.iacr.org/2016/1195 [eprint.iacr.org]
2017-01-03 05:26
To mitigate remote timing and cache-timing attacks, many ubiquitous cryptography software libraries feature constant-time implementations of cryptographic primitives. In this work, we disclose a vulnerability in OpenSSL 1.0.1u that recovers ECDSA private keys for the standardized elliptic curve P-256 despite the library featuring both constant-time curve operations and modular inversion with microarchitecture attack mitigations. Exploiting this defect, we target the errant modular inversion code path with a cache-timing and improved performance degradation attack, recovering the inversion state sequence.
See also: http://seclists.org/oss-sec/2017/q1/52