Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

secret-sharing: Zeroize sensitive data #5928

Draft
wants to merge 21 commits into
base: master
Choose a base branch
from

Conversation

peternose
Copy link
Contributor

No description provided.

@peternose peternose added the c:key management Category: key management label Nov 5, 2024
Copy link

netlify bot commented Nov 5, 2024

Deploy Preview for oasisprotocol-oasis-core canceled.

Name Link
🔨 Latest commit cf516e0
🔍 Latest deploy log https://app.netlify.com/sites/oasisprotocol-oasis-core/deploys/672ae128c673060008c6a6c2

@peternose peternose linked an issue Nov 5, 2024 that may be closed by this pull request
PrimeField implements the Copy trait, which means values are copied when
passed as parameters. To prevent sensitive data from being replicated,
the switch point struct should accumulate points rather than coordinates.
The AddAssign, SubAssign, and MulAssign functions can now be used
only when the prime field supports zeroization. This ensures that
any leftover data from heap reallocation, when the right-hand-side
polynomial has more coefficients than the left-hand-side, is zeroized.

An alternative solution is to remove these functions, but this
could lead to performance drawbacks.
@peternose peternose force-pushed the peternose/trivial/churp-zeroize-secrets branch from d0fabf6 to cf516e0 Compare November 6, 2024 03:23
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c:key management Category: key management
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Zeroize sensitive CHURP data
1 participant