[45509] in Cypherpunks

home help back first fref pref prev next nref lref last post

Re: kocher's timing attack

daemon@ATHENA.MIT.EDU (Jiri Baum)
Sat Dec 16 23:58:01 1995

From: Jiri Baum <jirib@sweeney.cs.monash.edu.au>
To: cypherpunks@toad.com
Date: Sun, 17 Dec 1995 15:08:58 +1100 (EST)
In-Reply-To: <199512150203.VAA00869@opine.cs.umass.edu> from "Futplex" at Dec 14, 95 09:03:32 pm
Reply-To: jirib@cs.monash.edu.au

-----BEGIN PGP SIGNED MESSAGE-----

Hello cypherpunks@toad.com (Cypherpunks Mailing List)
  and futplex@pseudonym.com (Futplex)

Futplex writes:
... [in reply to others] ...
> You are overlooking the main point that this is a _timing_ attack. Unless
...
> Just beware of
> people with extremely precise stopwatches at key signing parties ;>

Hold on, you *never* sign directly at key signing parties!

Never take your key where:
  - it could be stolen
  - you suspect others may wish to influence your signing
  - somebody might spy your passphrase (hidden cameras in ceiling)

You take fingerprints, and sign when you get back home.


Re the timing subject, do you think it'd make a good party trick?

  * Think of a number between 20 and 30.
  * for 4-5 numbers a, "Multiply the orignal number by <a>"
  * the number you are thinking of is <number>

Now, anybody have statistics for mental arithmetic?

Jiri
- --
If you want an answer, please mail to <jirib@cs.monash.edu.au>.
On sweeney, I may delete without reading!
PGP 463A14D5 (but it's at home so it'll take a day or two)
PGP EF0607F9 (but it's at uni so don't rely on it too much)

-----BEGIN PGP SIGNATURE-----
Version: 2.6.2i

iQCVAwUBMNOXuyxV6mvvBgf5AQFEtgP/Wf5I205BAuqiuSEwkslbGP0nwV8ylA0G
nnmS1FFJjFkkfICxEp+/C0iQqLcYpp1ytio+yyWmAE+nDEomcmnQb40ElGjYB/2m
btP6cT9ozfM8lXY6Tfn+G+kduZWfpKyngoMDSPzYSNAuizD5qyUodYJXyjfz4y0p
BoXBMwB9IUA=
=EpU4
-----END PGP SIGNATURE-----

home help back first fref pref prev next nref lref last post