[PATCH] ecc: store EdDSA session key in secure memory
Jo Van Bulck
jo.vanbulck at cs.kuleuven.be
Thu Jan 19 17:22:52 CET 2017
Hi gcrypt-devel,
Regarding the function _gcry_ecc_eddsa_sign (cipher/ecc-eddsa.c), I am
wondering why the long-term secret key 'a' is stored in secure memory,
whereas the derived session key 'r' is not. This seems particularly
important in the case of EdDSA as the function _gcry_mpi_ec_mul_point
(mpi/ec.c) attempts to provide side-channel protection by using constant
time operations for scalars residing in secure memory.
As far as I understand from Bernstein et al.
(http://cr.yp.to/papers.html#ed25519), an attacker who learns 'r' from
side-channel observation during the signing process can easily recover
'a' as follows:
Given a valid signature (R,S) for message m, public key pk, point G and
hash function H,
S = r + a * H(encodepoint(R) + encodepoint(pk) + m) mod n
=> a = (S - r) / H(encodepoint(R) + encodepoint(pk) + m) mod n
Or am I missing something here? If not, I included a simple patch below.
Regards,
Jo
From dbc810e1a75559413e610d3913796559de792677 Mon Sep 17 00:00:00 2001
From: Jo Van Bulck <jo.vanbulck at cs.kuleuven.be>
Date: Thu, 19 Jan 2017 17:00:15 +0100
Subject: [PATCH 1/1] ecc: store EdDSA session key in secure memory.
* cipher/ecc-eddsa.c (_gcry_ecc_eddsa_sign): use mpi_snew to allocate
session key.
--
An attacker who learns the EdDSA session key from side-channel
observation during the signing process, can easily revover the long-
term secret key. Storing the session key in secure memory ensures that
constant time point operations are used in the MPI library.
Signed-off-by: Jo Van Bulck <jo.vanbulck at cs.kuleuven.be>
---
cipher/ecc-eddsa.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cipher/ecc-eddsa.c b/cipher/ecc-eddsa.c
index f91f848..813e030 100644
--- a/cipher/ecc-eddsa.c
+++ b/cipher/ecc-eddsa.c
@@ -603,7 +603,7 @@ _gcry_ecc_eddsa_sign (gcry_mpi_t input,
ECC_secret_key *skey,
a = mpi_snew (0);
x = mpi_new (0);
y = mpi_new (0);
- r = mpi_new (0);
+ r = mpi_snew (0);
ctx = _gcry_mpi_ec_p_internal_new (skey->E.model, skey->E.dialect, 0,
skey->E.p, skey->E.a, skey->E.b);
b = (ctx->nbits+7)/8;
--
2.7.4
More information about the Gcrypt-devel
mailing list