paint-brush
How to Securely Verify Signature Hashesby@tomhacohen
591 reads
591 reads

How to Securely Verify Signature Hashes

by Tom Hacohen5mOctober 24th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The issue described in this CVE uses a timing-based side-channel to execute an oracle attack against the hash verification. Or in more plain words: this attack uses the fact that the comparison may take different times based on the content, to construct a valid signature even without knowing the key.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - How to Securely Verify Signature Hashes
Tom Hacohen HackerNoon profile picture
Tom Hacohen

Tom Hacohen

@tomhacohen

I obsess over webhooks as Founder and CEO of Svix.

About @tomhacohen
LEARN MORE ABOUT @TOMHACOHEN'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Tom Hacohen HackerNoon profile picture
Tom Hacohen@tomhacohen
I obsess over webhooks as Founder and CEO of Svix.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Also published here