[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Matt Blaze: Paul Kocher's timing attack



> From: "Perry E. Metzger" <perry@piermont.com>
> ------- Forwarded Message
> The attack requires only a few thousand ciphertext samples and works
> against most implementations of public-key cryptosystems in which
> the attacker can measure accurately the target's computation time for
> each sample.
>
This will be fixed in Photuris by dithering the return time of the
Identification_Message.  A few extra milliseconds on top of a second
won't be a problem.  Thanks for bringing this up!

Bill.Simpson@um.cc.umich.edu
          Key fingerprint =  2E 07 23 03 C5 62 70 D3  59 B1 4F 5E 1D C2 C1 A2


Follow-Ups: