You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It uses a table-lookup. Since this lookup is not constant-time, maybe can leak some information about the encoded value, the key itself.
I don't know if a pratical attack already exist at this time, but othres already spot the same problem. Some libraries alraedy uses a constant-time decoding/encoding;
Looking the source code it uses the
base64.RawURLEncoding
:webcrypto/ecdsa/ecdsa.go
Lines 18 to 20 in be3d31d
It uses a table-lookup. Since this lookup is not constant-time, maybe can leak some information about the encoded value, the key itself.
I don't know if a pratical attack already exist at this time, but othres already spot the same problem. Some libraries alraedy uses a constant-time decoding/encoding;
LibSodium:
BoringSSL:
Should
webcrypto
uses this kind of functions?The text was updated successfully, but these errors were encountered: