oss-sec mailing list archives

Re: BoringSSL private key loading is not constant time


From: Peter Gutmann <pgut001 () cs auckland ac nz>
Date: Mon, 13 Oct 2025 23:12:07 +0000

Jeffrey Walton <noloader () gmail com> writes:

What does the attacker learn besides the key length?  Isn't that mostly
public information, like the TLS options used during cipher suite
negotiation?

It's a proof-of-concept from a very entertaining talk at the OpenSSL
conference, "Constant-Time BIGNUM Is Bollocks".  The BoringSSL folks had
claimed there were no timing side-channels in their code, this demonstrates a
timing side-channel.

Admittedly not a terribly useful one :-).

Peter.

Current thread: