Ingrian Networks Information for VU#997481

Cryptographic libraries and applications do not adequately defend against timing attacks


Not Affected

Vendor Statement

Ingrian Networks products are not susceptible to this vulnerability.

Ingrian Networks products perform RSA operations in hardware. The attack identifies bits in the key by measuring time differences in software to perform Montgomery reduction, and in the time differences between software implementations of normal and Karatsuba multiplication used to perform different parts of the RSA private key operation. RSA hardware does not have these time differences.

Additionally, Ingrian's software architecture is designed to mask any timing difference in hardware RSA operations.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Vendor References



The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.