From: James Black <black@eng.usf.edu>
To: cypherpunks@toad.com
Message Hash: c9c8cab40bca6155d0fa0cf31ae1b16892e6838137a698b347c50220956f702b
Message ID: <Pine.SUN.3.91.951214104857.4717A-100000@sunflash.eng.usf.edu>
Reply To: N/A
UTC Datetime: 1995-12-14 16:26:33 UTC
Raw Date: Fri, 15 Dec 1995 00:26:33 +0800
From: James Black <black@eng.usf.edu>
Date: Fri, 15 Dec 1995 00:26:33 +0800
To: cypherpunks@toad.com
Subject: Question about the Timing Attack
Message-ID: <Pine.SUN.3.91.951214104857.4717A-100000@sunflash.eng.usf.edu>
MIME-Version: 1.0
Content-Type: text/plain
Hello,
I have looked over the paper, but I will look more closely this weekend
(finals going on right now).
The main question I have, since my programs run over a network with
dumb terminals is this: If someone can get the timing information why
would they need it, since they can read the message. So how can this
attacker get the timing info without being able to read the message
(unencrypted)?
Thanx.
==========================================================================
James Black (Comp Sci/Comp Eng sophomore)
e-mail: black@eng.usf.edu
http://www.eng.usf.edu/~black/index.html
**************************************************************************
Return to December 1995
Return to “James Black <black@eng.usf.edu>”
1995-12-14 (Fri, 15 Dec 1995 00:26:33 +0800) - Question about the Timing Attack - James Black <black@eng.usf.edu>