[45186] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Timing Cryptanalysis Attack

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Mon Dec 11 16:36:43 1995

To: Matt Blaze <mab@crypto.com>
Cc: cypherpunks@toad.com
In-Reply-To: Your message of "Mon, 11 Dec 1995 14:06:55 EST."
             <199512111906.OAA01139@crypto.com> 
Reply-To: perry@piermont.com
Date: Mon, 11 Dec 1995 14:44:14 -0500
From: "Perry E. Metzger" <perry@piermont.com>


Matt Blaze writes:
> >The trivial way to handle this is simply to check user time with the
> >right system calls and make sure it always comes out the same with an
> >apropriate number of sleeps.
> 
> Of course, this works against a remote adversary, but not against one
> on the same machine who can look at actual CPU consumption (which doesn't
> increase when the target is blocked).

True enough, but using busy loops could handle that. However, I must
admit to being far more interested in handling the remote case
efficiently, especially given concerns people have about using
Photuris like systems on heavily pounded servers.

Perry

home help back first fref pref prev next nref lref last post