1995-12-15 - simple Unix CPU time quantization functions available

Header Data

From: Matt Blaze <mab@research.att.com>
To: cypherpunks@toad.com
Message Hash: 3ffca9958610bcdbb225d09ea1a64bf8a4f18706a71af21f5c9232e344f8ca3c
Message ID: <199512130702.CAA24131@nsa.tempo.att.com>
Reply To: N/A
UTC Datetime: 1995-12-15 10:56:29 UTC
Raw Date: Fri, 15 Dec 1995 18:56:29 +0800

Raw message

From: Matt Blaze <mab@research.att.com>
Date: Fri, 15 Dec 1995 18:56:29 +0800
To: cypherpunks@toad.com
Subject: simple Unix CPU time quantization functions available
Message-ID: <199512130702.CAA24131@nsa.tempo.att.com>
MIME-Version: 1.0
Content-Type: text/plain


I've made available a simple CPU time quantization package that
provides a simple interface to encapsulate code blocks that must
run in a multiple of a coarse-grained "quantized" amount of CPU
time.  It is useful in building various on-line cryptographic
protocols in which an attacker could otherwise learn key information
by observing the time the target takes to perform calculations that
use the secret (c.f., Paul Kocher's recent attacks).

The basic idea is that you can specify a "quantum" such that at the
end of an encapsulated block the CPU will busy-wait until the next
quantum multiple.  Fine-grained (below the quantum) timing information
is thereby denied to the observer (including unprivileged processes on
the same machine).  The code is quick-and-dirty and only runs on
Unix-centric platforms.  Test and use at your own risk.

There are (basically) no restrictions on the use or distribution
of the (very simple) code.

Get it from:
	ftp://research.att.com/dist/mab/quantize.shar

The quantize package is also part of Jack Lacy's cryptolib package (watch
this space for details).

-matt





Thread