A side-channel issue was discovered in Botan before 2.9.0. An attacker capable of precisely measuring the time taken for ECC key generation may be able to derive information about the high bits of the secret key, as the function to derive the public point from the secret scalar uses an unblinded Montgomery ladder whose loop iteration count depends on the bitlength of the secret. This issue affects only key generation, not ECDSA signatures or ECDH key agreement.
References
Link | Resource |
---|---|
https://botan.randombit.net/news.html | Release Notes Vendor Advisory |
https://botan.randombit.net/security.html | Vendor Advisory |
https://github.com/crocs-muni/ECTester | Not Applicable Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-03-08T19:00:00
Updated: 2019-03-08T18:57:01
Reserved: 2018-12-17T00:00:00
Link: CVE-2018-20187
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-03-08T19:29:00.250
Modified: 2019-03-12T20:39:00.550
Link: CVE-2018-20187
JSON object: View
Redhat Information
No data.
CWE