Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 190: Line 190:
*RSA blinding: most recently Boneh and Brumley[1] showed that RSA blinding is an effective defense against timing attacks on RSA.
*RSA blinding: most recently Boneh and Brumley[1] showed that RSA blinding is an effective defense against timing attacks on RSA.
*Cache invariant modular exponentiation: this is a variant of a modular exponentiation implementation that Colin Percival[2] showed to defend against cache-timing attacks.
*Cache invariant modular exponentiation: this is a variant of a modular exponentiation implementation that Colin Percival[2] showed to defend against cache-timing attacks.
*Doublechecking RSA signatures: Arithmetical errors in RSA signatures might leak the private key. Ferguson and Schneier[3] recommend that every RSA signature generation should verify the signature just generated. RSA signature verification is relatively fast and is likely to catch arithmetical errors in signatures.
*Doublechecking RSA signatures: Arithmetical errors in RSA signatures might leak the private key. Ferguson and Schneier[3] recommend that every RSA signature generation should verify the signature just generated.


== Results of FIPS 140-2 Level 2 Maintenance Validation of NSS 3.11.5 ==
== Results of FIPS 140-2 Level 2 Maintenance Validation of NSS 3.11.5 ==
canmove, Confirmed users
937

edits

Navigation menu