]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/commit - crypto/Kconfig
crypto: aes_ti - disable interrupts while accessing S-box
authorEric Biggers <ebiggers@google.com>
Thu, 18 Oct 2018 04:37:58 +0000 (21:37 -0700)
committerHerbert Xu <herbert@gondor.apana.org.au>
Fri, 9 Nov 2018 09:36:48 +0000 (17:36 +0800)
commit0a6a40c2a8c184a2fb467efacfb1cd338d719e0b
tree83c30f4e2775779925bd03c9d3f5f5f4f06887ae
parent9f4debe38415583086ce814798eeb864aeb39551
crypto: aes_ti - disable interrupts while accessing S-box

In the "aes-fixed-time" AES implementation, disable interrupts while
accessing the S-box, in order to make cache-timing attacks more
difficult.  Previously it was possible for the CPU to be interrupted
while the S-box was loaded into L1 cache, potentially evicting the
cachelines and causing later table lookups to be time-variant.

In tests I did on x86 and ARM, this doesn't affect performance
significantly.  Responsiveness is potentially a concern, but interrupts
are only disabled for a single AES block.

Note that even after this change, the implementation still isn't
necessarily guaranteed to be constant-time; see
https://cr.yp.to/antiforgery/cachetiming-20050414.pdf for a discussion
of the many difficulties involved in writing truly constant-time AES
software.  But it's valuable to make such attacks more difficult.

Reviewed-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Signed-off-by: Eric Biggers <ebiggers@google.com>
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
crypto/Kconfig
crypto/aes_ti.c