Even faster. If you manage to flip one bit of the private key during the computation of the signature, you can easily factorize the private key from the signature. (you've read it here first)https://twitter.com/jedisct1/status/1138496393318936577 …
This is a well known attack (e..g https://cybermashup.files.wordpress.com/2017/10/practical-fault-attack-against-eddsa_fdtc-2017.pdf … ) but being able to use Rowhammer to conduct it is indeed a very serious threat.
-
-
That's an old trick on smartcards, there are many others. Rowhammer et al. opens all of these existing attacks to remote servers, which was never thought of before.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.