SM2 is a public key cryptography suite originating from Chinese standards, including digital signatures and public key encryption. Ahead of schedule, code for this functionality was recently mainlined in OpenSSL, marked for the upcoming 1.1.1 release. We perform a security review of this implementation, uncovering various deficiencies ranging from traditional software quality issues to side-channel risks. To assess the latter, we carry out a side-channel security evaluation and discover that the implementation hits every pitfall seen for OpenSSL\u27s ECDSA code in the past decade. We carry out remote timings, cache timings, and EM analysis, with accompanying empirical data to demonstrate secret information leakage during execution of both d...
Interference between processes executing on shared hardware can be used to mount performance-degrada...
Cryptography provides techniques to cypher and de-cypher sensitive information through a token calle...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatu...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
TLS and SSH are two of the most commonly used proto- cols for securing Internet traffic. Many of the...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryptio...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously ...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack agai...
Security critical software, e.g., OpenSSL, comes with numerous side-channel leakages left unpatched ...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Interference between processes executing on shared hardware can be used to mount performance-degrada...
Cryptography provides techniques to cypher and de-cypher sensitive information through a token calle...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...
SM2 is a public key cryptography suite originating from Chinese standards, including digital signatu...
As side-channel attacks reached general purpose PCs and started to be more practical for attackers t...
TLS and SSH are two of the most commonly used proto- cols for securing Internet traffic. Many of the...
During the last decade, constant-time cryptographic software has quickly transitioned from an academ...
Electromagnetic (EM) side-channel traces of elliptic curve point multiplication during SM2 decryptio...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
Side-channel information is any type of information leaked through unexpected channels due to physic...
Recent work on Side Channel Analysis (SCA) targets old, well-known vulnerabilities, even previously ...
We provide further evidence that implementing software countermeasures against timing attacks is a n...
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack agai...
Security critical software, e.g., OpenSSL, comes with numerous side-channel leakages left unpatched ...
Side-channel analysis is a cryptanalytic technique that targets not the formal description of a cryp...
Interference between processes executing on shared hardware can be used to mount performance-degrada...
Cryptography provides techniques to cypher and de-cypher sensitive information through a token calle...
Graduation date: 2007Cryptographic devices leak timing and power consumption information that is eas...