Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Timing based RSA key recovery #676

Open
tomato42 opened this issue Jun 24, 2020 · 0 comments
Open

Timing based RSA key recovery #676

tomato42 opened this issue Jun 24, 2020 · 0 comments
Labels
complex Issues that require good knowledge of tlsfuzzer internals enhancement new feature to be implemented help wanted new test script will require creation of a new connection script

Comments

@tomato42
Copy link
Member

tomato42 commented Jun 24, 2020

Add tests to verify that extraction of private key based on private key operations is not possible.

See:

@tomato42 tomato42 added enhancement new feature to be implemented new test script will require creation of a new connection script complex Issues that require good knowledge of tlsfuzzer internals labels Jun 24, 2020
@tomato42 tomato42 added this to To do in Vulnerability testers via automation Jun 24, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
complex Issues that require good knowledge of tlsfuzzer internals enhancement new feature to be implemented help wanted new test script will require creation of a new connection script
Projects
Development

No branches or pull requests

1 participant