Less Leaky ECDSA signature generation (in master)

NIIBE Yutaka gniibe at fsij.org
Mon Mar 31 03:07:07 CEST 2025


Jacob Bachmeyer wrote:
> That raises another question:  is the modular reduction (or more 
> importantly its bypass if unneeded) constant-time?  In other words, is 
> the choice of "use intermediate result (0<X<P) as-is" or "reduce 
> intermediate result (P<X<2*P)" constant-time?  (It should already be; 
> this would be a fairly severe timing leak if it is not.)

In the context of ECDSA (Weierstrass curve), for NIST curves and
secp256k1, it's constant-time.  For other curves, it's good to have
constant-time implementation, but this goal has not been achieved in
libgcrypt yet.
-- 



More information about the Gcrypt-devel mailing list