Timing Cryptanalysis Attack

Matt Blaze mab at crypto.com
Mon Dec 11 15:02:56 PST 1995


>The trivial way to handle this is simply to check user time with the
>right system calls and make sure it always comes out the same with an
>apropriate number of sleeps.

Of course, this works against a remote adversary, but not against one
on the same machine who can look at actual CPU consumption (which doesn't
increase when the target is blocked).

-matt






More information about the cypherpunks-legacy mailing list