Michael Sierchio <[EMAIL PROTECTED]> writes:
> Timing analysis is of such little practical value that no one, to
> my knowledge, is willing to obscure the average key agreement (DH)
> or decryption (RSA) operation by adding random delays or by making
> all pubkey operations conform to the upper bound, worst case time.

That sounds like a "oh, no one would EVER mount THAT attack"
fallacy. They have a tendency to bite you in the buttocks.

I'm aware of a number of packages that use PKC that obscure timing
because the authors believed the threat to be quite real.

Perry
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to