CRYPTO NEWS

Is the Bitcoin cryptography library libsecp256k1 not susceptible to the Hertzbleed attack?

I was reading up on the recently disclosed Hertzbleed side channel attack(s).

It was speculated on Twitter that the Bitcoin cryptography library libsecp256k1 is not susceptible to these attacks. Firstly, is this true and why? Secondly, if it is true should these protections (e.g. blinding factors) be implemented in other cryptography libraries (not necessarily Bitcoin, cryptocurrency related) to protect against these attacks?

Compute a hash function given commitment to some secret element

Given a secret key x and a commitment to it comm(x) where comm(x) is both binding and hiding (it can be for example $g^x$ or some homomorphic encryption). Given public parameters $P_1,…,P_k$, comm(x), and an index i, is there a scheme, other than fully homomorphic encryption, to to compute $H(P_1,…,P_{i-1},x,P_{i+1},…,P_k)$ (where H is some collision::Listen

Given a secret key x and a commitment to it comm(x) where comm(x) is both binding and hiding (it can be for example $g^x$ or some homomorphic encryption). Given public parameters $P_1,…,P_k$, comm(x), and an index i, is there a scheme, other than fully homomorphic encryption, to to compute $H(P_1,…,P_{i-1},x,P_{i+1},…,P_k)$ (where H is some collision resistant hash function that act as a random oracle both on x and over public parameters $P_i$‘s)?

Is the Bitcoin cryptography library libsecp256k1 not susceptible to the Hertzbleed attack?

Shopping cart
There are no products in the cart!
Continue shopping
0