1995-12-12 - Re: Timing Attacks

Header Data

From: “Perry E. Metzger” <perry@piermont.com>
To: Bill Stewart <stewarts@ix.netcom.com>
Message Hash: c871dd4950a937e3f74459f761d6c770e8a283f3407659950d0c2df5f7ea2a89
Message ID: <199512120111.UAA00312@jekyll.piermont.com>
Reply To: <199512120026.QAA19309@ix12.ix.netcom.com>
UTC Datetime: 1995-12-12 04:53:35 UTC
Raw Date: Tue, 12 Dec 1995 12:53:35 +0800

Raw message

From: "Perry E. Metzger" <perry@piermont.com>
Date: Tue, 12 Dec 1995 12:53:35 +0800
To: Bill Stewart <stewarts@ix.netcom.com>
Subject: Re: Timing Attacks
In-Reply-To: <199512120026.QAA19309@ix12.ix.netcom.com>
Message-ID: <199512120111.UAA00312@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain



Bill Stewart writes:
> The attack also works better if you can try it multiple times with the same 
> numbers to work around random latency; the lowest number is closest to real.

Other statistical techniques can be used to get around random network
latency. Anyone who's used NTP is aware of the possibilities...

.pm





Thread