just one example of how important the work is that @BRIAN_____ does through ring and upstream improvements.https://twitter.com/BRIAN_____/status/824350014323384320 …
-
-
Replying to @a_z_e_t @BRIAN_____
what is the point of checking for primality? (I'm guessing provable here)
1 reply 0 retweets 0 likes -
to see if the keys you're using were generated correctly?
1 reply 0 retweets 0 likes -
Replying to @a_z_e_t @BRIAN_____
this is already done as part of generation
2 replies 0 retweets 0 likes -
*should* be done.
2 replies 0 retweets 0 likes -
-
We did recently find bugs in the primality testing logic of OpenSSL. (The 1 I found was in an unreleased version.)
1 reply 0 retweets 1 like -
Replying to @BRIAN_____ @lyon01_david
is this public? if so can you point me to the bug?
1 reply 0 retweets 1 like -
Replying to @a_z_e_t @lyon01_david
https://github.com/openssl/openssl/commit/d70a562714199c9a4eb835efe7b22c9a7017e7e5 …. Nothing to get too excited over. Somebody else found a better one, just preceding this.
2 replies 0 retweets 1 like -
interesting: o what about the other one?
1 reply 0 retweets 0 likes
It's in the commit history. BN_mod_word was broken. (On Windows only? On Windows + less common platforms?)
-
-
Also, any bug in (Montgomery) modmul or division potentially screws it up. There have been quite a few.
0 replies 0 retweets 1 likeThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.