From: “Perry E. Metzger” <perry@piermont.com>
To: Bill Stewart <stewarts@ix.netcom.com>
Message Hash: c871dd4950a937e3f74459f761d6c770e8a283f3407659950d0c2df5f7ea2a89
Message ID: <199512120111.UAA00312@jekyll.piermont.com>
Reply To: <199512120026.QAA19309@ix12.ix.netcom.com>
UTC Datetime: 1995-12-12 04:53:35 UTC
Raw Date: Tue, 12 Dec 1995 12:53:35 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Tue, 12 Dec 1995 12:53:35 +0800
To: Bill Stewart <stewarts@ix.netcom.com>
Subject: Re: Timing Attacks
In-Reply-To: <199512120026.QAA19309@ix12.ix.netcom.com>
Message-ID: <199512120111.UAA00312@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Bill Stewart writes:
> The attack also works better if you can try it multiple times with the same
> numbers to work around random latency; the lowest number is closest to real.
Other statistical techniques can be used to get around random network
latency. Anyone who's used NTP is aware of the possibilities...
.pm
Return to December 1995
Return to ““Perry E. Metzger” <perry@piermont.com>”