Ingrian Networks Information for VU#997481
Cryptographic libraries and applications do not adequately defend against timing attacks
Ingrian Networks products are not susceptible to this vulnerability.
Ingrian Networks products perform RSA operations in hardware. The attack identifies bits in the key by measuring time differences in software to perform Montgomery reduction, and in the time differences between software implementations of normal and Karatsuba multiplication used to perform different parts of the RSA private key operation. RSA hardware does not have these time differences.
Additionally, Ingrian's software architecture is designed to mask any timing difference in hardware RSA operations.
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.