Exploit Report

Computer Security And Bug Information


CVE Title
Published Date2024-06-10T02:15Z
Modified Date2024-06-12T16:30Z
CWE TypeCWE-203
DescriptionThe Kyber reference implementation before 9b8d306, when compiled by LLVM Clang through 18.x with some common optimization options, has a timing side channel that allows attackers to recover an ML-KEM 512 secret key in minutes. This occurs because poly_frommsg in poly.c does not prevent Clang from emitting a vulnerable secret-dependent branch.
By clicking these links you will leave this website. We do not endorse and will not be held accountable for any activity on external sites.
Reference URLhttps://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/
Reference Description https://pqshield.com/pqshield-plugs-timing-leaks-in-kyber-ml-kem-to-improve-pqc-implementation-maturity/
Reference URLhttps://github.com/antoonpurnal/clangover
Reference Description https://github.com/antoonpurnal/clangover
Reference URLhttps://github.com/pq-crystals/kyber/commit/9b8d30698a3e7449aeb34e62339d4176f11e3c6c
Reference Description https://github.com/pq-crystals/kyber/commit/9b8d30698a3e7449aeb34e62339d4176f11e3c6c
Reference URLhttps://news.ycombinator.com/item?id=40577486
Reference Description https://news.ycombinator.com/item?id=40577486
Reference URLhttps://twitter.com/purnaltoon/status/1797644696568959476
Reference Description https://twitter.com/purnaltoon/status/1797644696568959476
TagsExploit Third Party Advisory

This site's data is aggregated programmatically and provided "as is" without any representations or warranties, express or implied. Exploit.report is not affiliated with the The MITRE Corporation, U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), or US government in any way. CVE and the CVE logo are registered trademarks of The MITRE Corporation

© 2022 Exploit.Report | Data | Contact | Privacy Policy | Articles