[45209] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Timing Attacks

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Mon Dec 11 22:12:13 1995

To: Bill Stewart <stewarts@ix.netcom.com>
Cc: "Rev. Ben" <samman-ben@cs.yale.edu>, cypherpunks@toad.com
In-Reply-To: Your message of "Mon, 11 Dec 1995 16:25:05 PST."
             <199512120026.QAA19309@ix12.ix.netcom.com> 
Reply-To: perry@piermont.com
Date: Mon, 11 Dec 1995 20:11:33 -0500
From: "Perry E. Metzger" <perry@piermont.com>


Bill Stewart writes:
> The attack also works better if you can try it multiple times with the same 
> numbers to work around random latency; the lowest number is closest to real.

Other statistical techniques can be used to get around random network
latency. Anyone who's used NTP is aware of the possibilities...

.pm

home help back first fref pref prev next nref lref last post