Extend KES Sum construction with secure key erasure #122
Labels
crypto
Implementations of cryptography primitives and algorithms
priority high
issues/PRs that MUST be addressed. The release can't happen without this;
shelley mainnet
issues/PRs that need to be done for the Shelley mainnet
shelley testnet
issues/PRs that need to be done for the Shelley testnet
As an alternative to the strategy set out in #102, a potential short-cut is to extend the existing KES Sum construction with secure key erasure.
The following is an interim report from the internal audit of that implementation.
The approach would be to keep the Sum seeds and signing keys in
mlock
ed memory, and have all cryptographic primitives use the values from that area without making copies. Finalisers would be used to erase and release (andmunlock
) the memory. The finalisers would be called synchronously in the consensus code after the KES update, so there would be no reliance of the GC to invoke the finalisers reliably.Related:
mlock
safety for VRF FFI bindings #112 is the same idea but applied to the VRF rather than the KES.The text was updated successfully, but these errors were encountered: