29 November 2018
Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Hanno Böck.
New research shows that cryptographic code often is still vulnerable to side-channel attacks.
An attack called PortSmash shows how to exploit side channels in the hyperthreading functionality of modern CPUs. A proof of concept attack against OpenSSL has been published on GitHub, and a research paper also is available.
The core idea of this attack was published by Colin Percival thirteen years ago. The reason the OpenSSL code is vulnerable is that it has branches based on secrets. OpenSSL has released a security advisory.
Furthermore, a different, unrelated side-channel attack affecting the DSA and ECDSA code in OpenSSL also has been fixed. No details have been published on that attack. OpenSSL has released versions 1.0.2q, 1.1.0j, and 1.1.1a with fixes.
This subscription is just for the newsletter; we won't send you anything else.
Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.
Remote and trainer-led, with small classes and a choice of timezones.
Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.