Security Advisories (2)
CVE-2020-17478 (2020-08-10)

ECDSA/EC/Point.pm in Crypt::Perl before 0.33 does not properly consider timing attacks against the EC point multiplication algorithm.

CVE-2020-13895 (2020-06-07)

Crypt::Perl::ECDSA in the Crypt::Perl (aka p5-Crypt-Perl) module before 0.32 for Perl fails to verify correct ECDSA signatures when r and s are small and when s = 1. This happens when using the curve secp256r1 (prime256v1). This could conceivably have a security-relevant impact if an attacker wishes to use public r and s values when guessing whether signature verification will fail.

NAME

Crypt::Perl::RSA::PublicKey - object representation of an RSA public key

SYNOPSIS

#You’ll probably instantiate this class using Parser.pm
#or PrivateKey’s get_public_key() method.

#cf. JSON Web Algorithms (RFC 7518, page 5)
#These return 1 or 0 to indicate verification or non-verification.
$pbkey->verify_RS256($message, $sig);
$pbkey->verify_RS384($message, $sig);
$pbkey->verify_RS512($message, $sig);

#----------------------------------------------------------------------

my $enc = $pbkey->encrypt_raw($payload);

#----------------------------------------------------------------------

my $der = $pbkey->to_der();
my $pem = $pbkey->to_pem();

#----------------------------------------------------------------------

$pbkey->size();                 #modulus length, in bits
$pbkey->modulus_byte_length();

#----------------------------------------------------------------------
# The following all return instances of Crypt::Perl::BigInt,
# a subclass of Math::BigInt.
# The pairs (e.g., modulus() and N()) are aliases.
#----------------------------------------------------------------------

$pbkey->modulus();
$pbkey->N();

$pbkey->publicExponent();
$pbkey->E();
$pbkey->exponent();         #another alias of publicExponent()