canmove, Confirmed users
937
edits
Line 15: | Line 15: | ||
mitigate the attack(s).</FONT></FONT></FONT></P> | mitigate the attack(s).</FONT></FONT></FONT></P> | ||
<P ALIGN=LEFT STYLE="margin-top: 0.17in; margin-bottom: 0in"><FONT COLOR="#000080"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><I><B>Assessment:</B></I></FONT></FONT></FONT></P> | <P ALIGN=LEFT STYLE="margin-top: 0.17in; margin-bottom: 0in"><FONT COLOR="#000080"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3><I><B>Assessment:</B></I></FONT></FONT></FONT></P> | ||
<P ALIGN=LEFT STYLE="margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3> | <P ALIGN=LEFT STYLE="margin-bottom: 0in"><FONT COLOR="#000000"><FONT FACE="Times New Roman, Times New Roman, serif"><FONT SIZE=3>The NSS software cryptographic module is designed to mitigate timing attacks against RSA and cache attacks against the modular exponentiation operation used in RSA. The NSS software cryptographic module implements RSA blinding to mitigate timing attacks against RSA. It implements a "weaving" method to mitigate cache attacks against the modular exponentiation operation used in RSA and DSA.</FONT></FONT></FONT></P> | ||
==VE.11.01.02== | ==VE.11.01.02== |