Hiya,

I chatted briefly with Kenny at the IETF meeting about the
discussion we had in Stockholm about maybe being able to do
better with blinding as per the below. I'd say it'd be worth
having a chat with him about this. (I guess with Paul, me
and Kenny initially, but yell if you think it'd be better
to do it on this list and/or add someone else in.)

I'm happy to summarise back to this list if there's any
likely change,

Cheers,
S.

-------- Forwarded Message --------
Subject: Re: cryptech question
Date: Thu, 22 Mar 2018 09:24:21 +0000
From: Paterson, Kenny <kenny.pater...@rhul.ac.uk>
To: Stephen Farrell <stephen.farr...@cs.tcd.ie>

I looked into this briefly yesterday. The short answer is that there is
no short answer and I'd need to dig a lot deeper and/or consult some
experts on side channel attacks to be able to give a well-informed
answer. I do know who to ask. Let me know if that would be useful.
Sent from my iPhone

> On 21 Mar 2018, at 15:36, Stephen Farrell <stephen.farr...@cs.tcd.ie> wrote:
> 
> 
> Hiya,
> 
> I can get more context but here's the list discussion. [1] If cc'ing
> Pavel/Rob makes that easier and you're happy to chat with 'em direct,
> just say.
> 
> Question is: are there circumstances where it might be safe to turn
> off blinding.
> 
> The context is only RSA signing inside the hsm where we're fairly
> confident that the implementation is constant time and the reason
> to ask is for performance improvement. (Signing is slow now.)
> 
> Cheers,
> S.
> 
> [1] https://lists.cryptech.is/archives/tech/2017-July/002822.html
> <0x7B172BEA.asc>

Attachment: 0x5AB2FAF17B172BEA.asc
Description: application/pgp-keys

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Tech mailing list
Tech@cryptech.is
https://lists.cryptech.is/listinfo/tech

Reply via email to