5

I am analyzing the impact of CVE-2016-1000341 having CVSS score 7.5 and description "DSA signature generation vulnerable to timing attack. Where timings can be closely observed for the generation of signatures, the lack of blinding in 1.55 or earlier, may allow an attacker to gain information about the signatures k value and ultimately the private value as well.". It is acknowledged by BouncyCastle here: https://www.bouncycastle.org/releasenotes.html.

I am confused by the line: "DSA signature generation vulnerable to timing attack". While I understand what is timing attack, I am confused by the clause "DSA signature generation". What is the precise meaning of this term? Which of the following two or something else is true?

  1. If an application is digitally signing and verifying data with the BouncyCastle library using public/private key, is it vulnerable due to this vulnerability? OR
  2. Does "DSA signature generation" mean generating private and public key that are used in digital signature validation?

Any guidance here would be greatly appreciated!

Kind regards, Shashi

shashi
  • 151
  • 2

1 Answers1

1

TLDR: 1a.

DSA signature generation is generating a signature (for data). As you quoted

... gain information about the signatures [sic - should have an apostrophe] k value and ultimately the private value as well.

k is a value that is chosen randomly for each signature and is not part of the key, so it could not be part of key generation (or parameter generation which in DSA is often conflated, including in Java/JCE/BC). In order for there to be a k value at risk, the operation must be signature generation.

Verifying a signature, called signature verification, is not affected because it does not use the privatekey which is the target of sidechannel attacks including timing.

dave_thompson_085
  • 9,759
  • 1
  • 24
  • 28
  • Thanks Dave. If an application is digitally signing data with the BouncyCastle library using public/private key, it must be vulnerable to this vulnerability, correct? – shashi Aug 10 '17 at 04:44
  • If as the note also says 'timings can be closely observed'. If you are signing data as a result of a visible event like a protocol message, and the result is also visible for example you send it, and this can be repeated enough times (BC doesn't seem to have released info on how many), probably. If you are signing data because for example you decided on your own to send an email, no. – dave_thompson_085 Aug 12 '17 at 06:51