Lucene search

K
osvGoogleOSV:GHSA-X5J2-G63M-F8G4
HistoryFeb 09, 2024 - 4:19 p.m.

pqc_kyber KyberSlash: division timings depending on secrets

2024-02-0916:19:53
Google
osv.dev
1
kyber
timing attack
libraries
division
secret information
cpu cycles
variation
faq
daniel j. bernstein
mitigation
safe_pqc_kyber

7 High

AI Score

Confidence

Low

Various Kyber software libraries in various environments leak secret information into timing, specifically because

  • these libraries include a line of code that divides a secret numerator by a public denominator,
  • the number of CPU cycles for division in various environments varies depending on the inputs to the division, and
  • this variation appears within the range of numerators used in these libraries.

The KyberSlash pages track which Kyber libraries have this issue, and include a FAQ about the issue.

Author

The KyberSlash pages were written by Daniel J. Bernstein. The FAQ originally said β€œI”, but some people seemed to have trouble finding this authorship statement, so the FAQ now says β€œBernstein” instead.

URL

The permanent link for the KyberSlash pages is https://kyberslash.cr.yp.to.

Mitigation status in pqc_kyber crate

The issues has not been resolved in the pqc_kyber crate. A third-party fork that mitigates this attack vector has been published as safe_pqc_kyber.

CPENameOperatorVersion
pqc_kyberle0.7.1

7 High

AI Score

Confidence

Low