Kocher did work on the SSL v3.0 protocol, which corrects some errors
in the previous version.  At the risk of repeating myself, timing
or power analysis attacks are not mounted against SSL, but against
the public key operations.  Given the nature of their place in the
protocol, and that -- even if you could use a server as an oracle --
it is exceedingly difficult to time things precisely, the attack
is primarily of academic significance.

Timing analysis is of such little practical value that no one, to
my knowledge, is willing to obscure the average key agreement (DH)
or decryption (RSA) operation by adding random delays or by making
all pubkey operations conform to the upper bound, worst case time.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to