supranational / blst

Multilingual BLS12-381 signature library
Apache License 2.0
454 stars 171 forks source link

ec_mult.h: add minimal countermeasure against power-monitoring attack. #192

Closed dot-asm closed 9 months ago

dot-asm commented 10 months ago

It's argued that [batches of] multiplications by zero can be discerned by monitoring the power and possibly even electromagnetic radiation. Since [otherwise constant-time] operations on infinity points perform batches of multiplications by zero, they could be used to identify sequences of zero bits in the secret key. To minimize the leakage, always pass non-infinity points to point operations and mask the throw-away results.

dot-asm commented 9 months ago

Merged [after a fuzzing round].