RUSTSEC-2022-0045

Source
https://rustsec.org/advisories/RUSTSEC-2022-0045
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2022-0045.json
Aliases
Published
2022-07-30T12:00:00Z
Modified
2023-11-08T04:20:13.312979Z
Details

Wouter Castryck and Thomas Decru presented an efficient key recovery attack on the SIDH protocol. As a result, the secret key of SIKEp751 can be recovered in a matter of hours. The SIKE and SIDH schemes will be removed from oqs 0.7.2.

The affected schemes are the oqs::kem::Algorithm::Sike* and oqs::kem::Algorithm::Sidh* enum variants.

An efficient key recovery attack on SIDH (preliminary version)

References

Affected packages

crates.io / oqs

Package

Name
oqs

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.7.2

Ecosystem specific

{
    "affects": {
        "os": [],
        "functions": [],
        "arch": []
    }
}

Database specific

{
    "cvss": null,
    "informational": null,
    "categories": [
        "crypto-failure"
    ]
}