[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Timing Cryptanalysis Attack
Jim Gillogly wrote:
| > Nathaniel Borenstein <[email protected]> writes:
| > Hey, don't go for constant time, that's too hard to get perfect. Add a
| > *random* delay. This particular crypto-flaw is pretty easy to fix.
| > (See, I'm not *always* arguing the downside of cryptography!)
|
| Random delay may be harder to get perfect than constant time. Note that
| the actual time for the transaction is the minimum of all the transaction
| times you measure, since you can't add a negative delay to them. It's
| presumably even easier if the random distribution is known. Adding a
| random delay means more transactions are required to find each new bit,
| but information is still leaking.
Does the delay have to be random, or does the total time for a
transacation need to be unrelated to the bits in the secret key?
Assume that the time added is pseudo-random (and confidential).
Further, for any non-overlapping group of N transactions, the
distribution of the times fits some predetermined curve, say a bell
curve.
We've added a non random number, but since those numbers end
up being a curve, it would be difficult to determine which transaction
got which time added to it. This resembles the 'make them all a
constant time', but allows us to send out some in a shorter time than
the maximum (although most transactions should probably take longer
than the average.)
Adam
--
"It is seldom that liberty of any kind is lost all at once."
-Hume