We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
If functions Encapsulate(), Decapsulate() and ECDH() could be called by an attacker, he could recover any private key that he interacts with.
Encapsulate()
Decapsulate()
ECDH()
Patched in v2.0.8
You could manually check public key by calling IsOnCurve() function from secp256k1 libraries.
IsOnCurve()
https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md
Impact
If functions
Encapsulate()
,Decapsulate()
andECDH()
could be called by an attacker, he could recover any private key that he interacts with.Patches
Patched in v2.0.8
Workarounds
You could manually check public key by calling
IsOnCurve()
function from secp256k1 libraries.References
https://github.com/ashutosh1206/Crypton/blob/master/Diffie-Hellman-Key-Exchange/Attack-Invalid-Curve-Point/README.md