[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

P-384 and P-521 vulnerable to an electro-magnetic side channel attack on signature generation - CVE-2020-6829

ID: oval:org.secpod.oval:def:65268Date: (C)2020-08-26   (M)2023-11-19
Class: VULNERABILITYFamily: macos




Mozilla Firefox 80 : When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed.

Platform:
Apple Mac OS 14
Apple Mac OS 13
Apple Mac OS 12
Apple Mac OS 11
Apple Mac OS X 10.9
Apple Mac OS X 10.10
Apple Mac OS X 10.11
Apple Mac OS X 10.12
Apple Mac OS X 10.13
Apple Mac OS X 10.14
Apple Mac OS X 10.15
Product:
Mozilla Firefox
Reference:
CVE-2020-6829
CVE    1
CVE-2020-6829

© SecPod Technologies