[45329] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: Timing Cryptanalysis Attack

daemon@ATHENA.MIT.EDU (Mark Twain Ecash Support)
Wed Dec 13 11:49:58 1995

Date: Wed, 13 Dec 1995 10:25:42 -0600
To: Adam Shostack <adam@lighthouse.homeport.org>
From: Mark Twain Ecash Support <support@marktwain.com>
Cc: cypherpunks@toad.com

At 09:39 AM 12/13/95 -0500, you wrote:
>Armadillo Remailer wrote:
>
>| >My gut & scribble-on-the-back-of-a-napkin feeling about this class of
>| >attack is that it could be a problem for smartcards (almost certainly)
>| 
>| Is it a problem to create smartcards that do their calculations in
>| fixed time? I'd guess it should be easier than on multi-purpose
>| hardware.
>
>	Not if the fixed time is in weeks.
>
>	If you read the Crypto proceedings, you'll find a number of
>papers on using an (untrusted) CPU, such as that in a cash machine, to
>aid a smartcard.  This is because the CPUs in smartcards are very
>slow.

DigiCash has been aware of the timing problem for years. Especially as it
relates to smartcards, for which you can get timings down to the clock
cycle. Cosequently, both DigiCash's smartcards and DigiCash's Ecash use
fixed timings.

--Lucky at work

--Mark Twain Bank Ecash Support
  Ecash. The secure Internet payment system that protects your privacy.
  <http://www.marktwain.com/ecash.html>


home help back first fref pref prev next nref lref last post