[45326] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Timing Cryptanalysis Attack

daemon@ATHENA.MIT.EDU (Adam Shostack)
Wed Dec 13 09:58:36 1995

From: Adam Shostack <adam@homeport.org>
To: remailer@armadillo.com (Armadillo Remailer)
Date: Wed, 13 Dec 1995 09:39:52 -0500 (EST)
Cc: cypherpunks@toad.com
In-Reply-To: <199512131315.HAA01726@monad.armadillo.com> from "Armadillo Remailer" at Dec 13, 95 07:15:01 am

Armadillo Remailer wrote:

| >My gut & scribble-on-the-back-of-a-napkin feeling about this class of
| >attack is that it could be a problem for smartcards (almost certainly)
| 
| Is it a problem to create smartcards that do their calculations in
| fixed time? I'd guess it should be easier than on multi-purpose
| hardware.

	Not if the fixed time is in weeks.

	If you read the Crypto proceedings, you'll find a number of
papers on using an (untrusted) CPU, such as that in a cash machine, to
aid a smartcard.  This is because the CPUs in smartcards are very
slow.

	Maximchuck, at Bell Labs, has a protocol for Anonymous Credit
Cards which uses pre-chosen private keys between correspondants and a
set of remailers to anonymize credit card transactions with respsect
to a merchant. (The bank still knows who's buying how much, and I
think where.)  Anyway, he freely admits that the reason for private
key work is their cards couldn't handle the public key operations.

Adam

-- 
"It is seldom that liberty of any kind is lost all at once."
					               -Hume


home help back first fref pref prev next nref lref last post