Yup, confirmed: the ROCA guys deliberately obfuscated their vulnerable key test (and made it slower). This is sad.https://github.com/crocs-muni/roca/issues/39 …
-
-
Replying to @marcan42
mongo Retweeted mongo
Its a "fingerprint", which is heuristic and (imo) doesnt reveal anything about the particular weakness; see,https://twitter.com/mongobug/status/920322434791821312 …
mongo added,
1 reply 0 retweets 1 like -
Replying to @mongobug
It's not a heuristic, it's a strict check. It detects 100% of Infineon keys and has a tiny false positive rate for non-Infineon keys.
3 replies 0 retweets 1 like -
Replying to @marcan42
The link I just posted generates non-Infineon keys with a 100% false positive rate according to the "strict check".
1 reply 0 retweets 0 likes -
Replying to @mongobug
Of course you can *construct* false positives (or true positives - are you sure your keys are not vulnerable?), but that means nothing.
1 reply 0 retweets 0 likes -
Replying to @marcan42
"Are you sure your keys are not vulnerable?" - nope, I'm not, but I'm quite curious to find out :) (current uneducated guess is they're not)
1 reply 0 retweets 0 likes
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.