diff options
author | Sybren A. Stüvel <sybren@stuvel.eu> | 2020-11-15 16:25:51 +0100 |
---|---|---|
committer | Sybren A. Stüvel <sybren@stuvel.eu> | 2020-11-15 16:27:29 +0100 |
commit | 06ec1ea1cc7be6034144bd06f07c35eb9d1b4953 (patch) | |
tree | 40334f927f89e702bb3e02f43a2733ff13680d86 /tests/test_pem.py | |
parent | 341e5c4f939988bd472530441b6a02b625a30806 (diff) | |
download | rsa-git-06ec1ea1cc7be6034144bd06f07c35eb9d1b4953.tar.gz |
Fix #162: Blinding uses slow algorithm
Store blinding factor + its inverse, so that they can be reused & updated
on every blinding operation. This avoids expensive computations.
The reuse of the previous blinding factor is done via squaring (mod n), as
per section 9 of 'A Timing Attack against RSA with the Chinese Remainder
Theorem' by Werner Schindler, https://tls.mbed.org/public/WSchindler-RSA_Timing_Attack.pdf
Diffstat (limited to 'tests/test_pem.py')
0 files changed, 0 insertions, 0 deletions