You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: doc/security/cryptolib/security.md
+4-1Lines changed: 4 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,7 +66,10 @@ The following software-based countermeasures are implemented:
66
66
### RSA
67
67
Modular exponentiation is the core operation for both RSA encryption/sign and key generation.
68
68
It is implemented as a constant-time Montgomery Ladder with Boolean-masked exponents and blinded base points as detailed in the following works:
69
+
69
70
-https://eprint.iacr.org/2018/1226.pdf
70
71
-https://dl.acm.org/doi/10.1145/1873548.1873556
72
+
71
73
The combination of both countermeasures results in an exponentiation that is resistant against vertical and horizontal power analysis.
72
-
This hardened exponentiation is reused in the primality check routine of the key generation algorithm.
74
+
This hardened exponentiation is reused in the primality check routine of the key generation algorithm rendering it equally hardened.
75
+
The key generation hardening only applies to [otcrypto_rsa_keygen](https://github.com/lowRISC/opentitan/tree/master/sw/device/lib/crypto/include/rsa.h#L100) and not [otcrypto_rsa_keypair_from_cofactor](https://github.com/lowRISC/opentitan/tree/master/sw/device/lib/crypto/include/rsa.h#L155).
0 commit comments