⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 security.xml

📁 这是一个C的源代码
💻 XML
字号:
<chapter><title>Security Issues</title><para>There are potential security issues that may cause concern for someprogrammers.</para><section><title>Truncated Hashes</title><para>For points on an elliptic curve over the base field,<function>element_from_hash()</function> will truncate the input hashuntil it can represent an x-coordinate in that field.(PBC then computes a corresponding y-coordinate.)Ideally the hash length should be smallerthan size of the base field and also the size of the elliptic curve group.</para><para>Hashing to elements in field extensions does not take advantage of the factthat the extension has more elements than the base field. I intend to rewritethe code so that for a degree n extension code, PBC splits the hash into n partsand determine each polynomial coefficient from one ofthe pieces.At the moment every coefficient is the same and depends on the whole hash.</para><para>This is not a problem because all the pairing types use an integer mod ringas the base field, rather than an extension of some low characteristic field.</para></section><section><title>Zeroed Memory</title><para>Unlike OpenSSL, there are no functions to zero memory locations usedin sensitive computations, though to some extent, one can use<function>element_random()</function> to overwrite data.I have no immediate plans to implement this, but couldbe convinced to do so if I hear enough reasons.</para></section><section><title>PRNG Determinism</title><para>On platforms without <filename>/dev/urandom</filename> PBC falls back ona deterministic pseudo-random number generator, which needless to say isuseless for any security applications.</para><para>One should note how <filename>/dev/urandom</filename> differs from<filename>/dev/random</filename>. A quote from its manpage:</para><para><quote>A  read  from  the  /dev/urandom device will not block waiting for moreentropy.  As a result, if  there  is  not  sufficient  entropy  in  theentropy  pool,  the  returned  values are theoretically vulnerable to acryptographic attack on the algorithms used by the  driver.   Knowledgeof how to do this is not available in the current non-classified literature,but it is theoretically possible that such an attack may  exist.If this is a concern in your application, use /dev/random instead.</quote></para></section></chapter>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -