[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Matt Blaze: Paul Kocher's timing attack
> From: "Perry E. Metzger" <perry@piermont.com>
> ------- Forwarded Message
> The attack requires only a few thousand ciphertext samples and works
> against most implementations of public-key cryptosystems in which
> the attacker can measure accurately the target's computation time for
> each sample.
>
This will be fixed in Photuris by dithering the return time of the
Identification_Message. A few extra milliseconds on top of a second
won't be a problem. Thanks for bringing this up!
Bill.Simpson@um.cc.umich.edu
Key fingerprint = 2E 07 23 03 C5 62 70 D3 59 B1 4F 5E 1D C2 C1 A2
Follow-Ups: