You may remember a few months ago that a timing attack against the elliptic 
curve cryptography implementation in OpenSSL was announced:
        http://eprint.iacr.org/2011/232
        
http://it.slashdot.org/story/11/05/27/1956231/openssl-timing-attack-can-intercept-private-keys

The same attack applies to NSS.  A while back I submitted a bug and patch for 
NSS, but it has been languishing in Bugzilla without any attention.  While the 
use of ECC in deployed TLS environments is quite low, it's still probably a 
good idea to get the code patched.  Perhaps someone will take a look at this 
forlorn bug and patch?

https://bugzilla.mozilla.org/show_bug.cgi?id=660394

Douglas
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to