The attack does not rely on bugs in the browser's nominal sandboxing mechanisms, or on fooling users. It applies even to locked-down platforms with strong confinement mechanisms and browser-only functionality, such as Chromebook devices.
Moreover, on browser-based platforms the attacked software too may be written in portable JavaScript; and we show that in this case even implementations of supposedly-secure constant-time algorithms, such as Curve25519's, are vulnerable to our attack.
Category / Keywords: implementation / Side-channel attack, cache attack, web page confinement, ElGamal, RSA, ECDH Date: received 31 Jan 2018 Contact author: tromer at cs tau ac il Available format(s): PDF | BibTeX Citation Version: 20180131:202745 (All versions of this report) Short URL: ia.cr/2018/119 Discussion forum: Show discussion | Start new discussion