GHSA-hrjv-pf36-jpmr

Suggest an improvement
Source
https://github.com/advisories/GHSA-hrjv-pf36-jpmr
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/08/GHSA-hrjv-pf36-jpmr/GHSA-hrjv-pf36-jpmr.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-hrjv-pf36-jpmr
Aliases
Published
2022-08-18T19:01:15Z
Modified
2023-11-08T04:20:13.312979Z
Summary
oqs's Post-Quantum Key Encapsulation Mechanism SIKE broken
Details

Wouter Castryck and Thomas Decru presented an efficient key recovery attack on the SIDH protocol. As a result, the secret key of SIKEp751 can be recovered in a matter of hours. The SIKE and SIDH schemes will be removed from oqs 0.7.2.

An efficient key recovery attack on SIDH (preliminary version)

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2022-08-18T19:01:15Z"
}
References

Affected packages

crates.io / oqs

Package

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.7.2