Timing attack against AES

Jean-David Beyer jdbeyer at exit109.com
Tue May 24 12:55:06 CEST 2005


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Aside from the necessity to compromise the machine running gpg to get the
timing data for this attack,
just how much data can a timing attack retrieve from a multiprogramming
system, such as UNIX, Linux, etc., anyway, since all the other processes
running at the same time, which could include web servers, file servers,
database servers, name servers, mail servers, etc., would really add a lot
of noise to the data obtained?

- --
  .~.  Jean-David Beyer          Registered Linux User 85642.
  /V\  PGP-Key: 9A2FC99A         Registered Machine   241939.
 /( )\ Shrewsbury, New Jersey    http://counter.li.org
 ^^-^^ 06:50:00 up 4 days, 6:48, 4 users, load average: 4.20, 4.22, 4.13
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCkwgKPtu2XpovyZoRAi8+AJ9mN5HgiPkGWroUamo8v10EOu6yeQCfbgtS
5JAjWZfw/+TwLIcG6Fl5Opo=
=jk9b
-----END PGP SIGNATURE-----



More information about the Gnupg-users mailing list