41 entries in 0.514s
mircea_popescu: Turns out, Kochs pile of shit, despite eschewing constant time arithmetic, and being implemented in Overflowandcrashlang
loses the footrace, when given a full-width
modular exponentiation (i.e. one where it cannot cheat by skipping over leading zeroes.)
mircea_popescu: is it or is it not true a
modular exponentiation in current gpg takes, on your chosen machine, 0.26 seconds.
a111: Logged on 2017-09-16 15:31 asciilifeform: in other olds ( i dun think i posted this measurement ) the NAIVE
modular exponentiator takes 51.3 seconds per 4096b a*b mod m , on the 'standard' test box
mircea_popescu: asciilifeform amusingly, the guy complains about the
modular exponentiation not being constant time. maybe write to him ask where he ever saw a sane algo ?
sina: also: Complete break of RSA-1024 as implemented in Libgcrypt
https://eprint.iacr.org/2017/627.pdf, "And 13% of RSA-2048 keys. Whoopsie!", "The new bit is showing that LtR sliding windows are a Very Bad Choice for
modular exponentiation. Very nice."
mircea_popescu: asciilifeform i imagine he means that it overflow between the
exp and the
modular steps.
mircea_popescu: the thing is called
modular exponentiation you know :D
assbot: Logged on 23-12-2015 22:29:00; ascii_field: thestringpuller: be grateful that you don't have to
modular-
exponentiate by hand.
ascii_field: thestringpuller: be grateful that you don't have to
modular-
exponentiate by hand.
☟︎ kakobrekla: good thing my mattress is
modular, i can easily
expand to bed more women
mike_c: cancellations deep inside GnuPG’s
modular exponentiation algorithm. This causes the special value