1995-12-12 - Re: Re[2]: Timing Cryptanalysis Attack

Header Data

From: “David E. Smith” <dsmith@midwest.net>
To: “Martin Diehl” <mdiehl@dttus.com>
Message Hash: e0cc61462d9edeeaa53870c0f2eb1f7dba35970c72ae468832f72b5e08b51f4a
Message ID: <199512120558.XAA02070@cdale1.midwest.net>
Reply To: N/A
UTC Datetime: 1995-12-12 07:19:07 UTC
Raw Date: Tue, 12 Dec 1995 15:19:07 +0800

Raw message

From: "David E. Smith" <dsmith@midwest.net>
Date: Tue, 12 Dec 1995 15:19:07 +0800
To: "Martin Diehl" <mdiehl@dttus.com>
Subject: Re: Re[2]: Timing Cryptanalysis Attack
Message-ID: <199512120558.XAA02070@cdale1.midwest.net>
MIME-Version: 1.0
Content-Type: text/plain


At 10:30 PM 12/11/95 CST, Martin Diehl wrote:

>     OTOH, maybe we _should_ try for constant computation time and then try 
>     for *random* delay time.  Remember that _we_ will spend a lot of real 
>     time arguing whether the *random* delay is really _random_
Does it necessarily matter whether the random delay time is true-random?
The idea is to obfuscate the time of the whole computation.  As long
as you don't base your random numbers on the system clock, it should
serve its purpose.  (I omit the system clock because timing seems to be
the nexus of the whole attack, so we can safely assume that the clock's
data, and thus its source of "randomness," can be predicted.
----- David E. Smith, c/o Southeast Missouri State University
1210 Towers South, Cape Girardeau MO USA 63701-4745, +1(573)339-3814
PGP ID 0x92732139, homepage http://www.midwest.net/scribers/dsmith/
Quote: "And if we change, well, I'll love you anyway" - Alice In Chains
Dec15-Jan15: (618)244-3340/2209 Perkins, Mt Vernon IL 62864





Thread