Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Encryption Security

OpenSSL Timing Attack Can Intercept Private Keys 31

Trailrunner7 writes "Remote timing attacks have been a problem for cryptosystems for more than 20 years. A new paper shows that such attacks are still practical ... The researchers, Billy Bob Brumley and Nicola Tuveri of Aalto University School of Science, focused their efforts on OpenSSL's implementation of the elliptic curve digital signature algorithm, and they were able to develop an attack that allowed them to steal the private key of an OpenSSL server."
This discussion has been archived. No new comments can be posted.

OpenSSL Timing Attack Can Intercept Private Keys

Comments Filter:
  • by Co0Ps ( 1539395 ) on Friday May 27, 2011 @07:31PM (#36268782)
    "Fixed delay" refers to a fixed and delay-padded time frame the whole operation runs in where the total time of the frame is equal or longer than the worst case of any cryptosystem - or for either of them - but preferably longer to account for safety margin and because delay makes brute force harder anyway.
  • by Mysteray ( 713473 ) on Friday May 27, 2011 @08:08PM (#36269136)

    It's not FUD and it's not "the sky is falling" either.

    This is cryptographers communicating with one another. Terms like "attack" are being used here in their academic meaning. It's an interesting result, exciting even, but shouldn't be emotionally charged.

    If there are any real systems at risk, I don't know of them. But it's certainly possible that someone somewhere is really screwed by this attack, so it should be taken seriously. Anyone using ECDSA should probably apply the forthcoming patches as soon as is practical. This is good advice in any case.

Don't be irreplaceable, if you can't be replaced, you can't be promoted.

Working...