Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ECDSA signing is vulnerable to timing attacks #11

Open
frasertweedale opened this issue Apr 16, 2015 · 3 comments
Open

ECDSA signing is vulnerable to timing attacks #11

frasertweedale opened this issue Apr 16, 2015 · 3 comments
Labels

Comments

@frasertweedale
Copy link
Owner

Crypto.PubKey.ECC.ECDSA signing operations are vulnerable to timing attacks.
Switch to a safe implementation.

http://hackage.haskell.org/package/crypto-pubkey-0.2.8/docs/Crypto-PubKey-ECC-ECDSA.html

@sophie-h
Copy link
Contributor

Am I right to assume this bug has actually been fixed with #12 been closed? There is still a warning in the README.

@frasertweedale
Copy link
Owner Author

@sophie-h alas no, the latest version of cryptonite still apparently has the timing problem: https://hackage.haskell.org/package/cryptonite-0.21/docs/Crypto-PubKey-ECC-ECDSA.html

@sophie-h
Copy link
Contributor

sophie-h commented Jan 27, 2017 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants