[17523] in cryptography@c2.net mail archive
Re: AES cache timing attack
daemon@ATHENA.MIT.EDU (Peter Gutmann)
Tue Jun 21 16:09:13 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: pgut001@cs.auckland.ac.nz (Peter Gutmann)
To: iang@systemics.com, pgut001@cs.auckland.ac.nz
Cc: cryptography@metzdowd.com, hal@finney.org,
neuhaus@st.cs.uni-sb.de
In-Reply-To: <200506211422.01495.iang@systemics.com>
Date: Wed, 22 Jun 2005 01:33:57 +1200
Ian G <iang@systemics.com> writes:
>On Tuesday 21 June 2005 13:45, Peter Gutmann wrote:
>>Best Current Practice, a special-case type of RFC. Based on recent experience
>>with this style of collaborative document editing, I've set up a wiki at
>>http://blockcipher.pbwiki.com/, blank username, password 'sbox', for anyone
>>who wants to add their $0.02 about what to do/what not to do to protect block
>>ciphers from side-channel attacks. If it works out, this could turn into a
>>BCP.
>
>That's what I like, action, not words! To celebrate this, I've stuck some
>words in there which others can act on ;-)
Uhh, that wasn't really what I was after, that's pretty much textbook stuff,
what I wanted was specifically advice on how to use block ciphers in a way
that avoids possibilities for side-channel (and similar) attacks. I have some
initial notes that can be summarised as "Don't let yourself be used as an
oracle" that I was planning to add after I've fleshed them out a bit.
Peter.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com