[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Matt Blaze: Paul Kocher's timing attack




"William Allen Simpson" writes:
> > From: "Perry E. Metzger" <perry@piermont.com>
> > ------- Forwarded Message
> > The attack requires only a few thousand ciphertext samples and works
> > against most implementations of public-key cryptosystems in which
> > the attacker can measure accurately the target's computation time for
> > each sample.
> >
> This will be fixed in Photuris by dithering the return time of the
> Identification_Message.  A few extra milliseconds on top of a second
> won't be a problem.  Thanks for bringing this up!

Actually, it might be better to determine the length of time the
maximal computation takes and to assure (by checking the time before
and after the computation, and then sleeping for a moment) that all
computations appear to take the same amount of time to an outsider.


Perry


References: