Timing attacks are primarily an implementation issue, rather
than a protocol issue.  The SSL 3.0 spec doesn't try to
describe all the things that implementations need to do
in order to be secure, as this would have been far too
complex and implementation-specific to include.

Having said this, I did help Netscape make sure that their
implementation was resistant to timing attacks (among others).

Cheers,
Paul


At 04:08 PM 7/15/2002 -0700, Shalendra Chhabra wrote:
>Just a short piece of information will help me in my
>student life
>
>Paul kocher had discovered Timing analysis attack on
>Implementations of Public Key Cryptosystems like
>Diffie Hellman , RSA etc
>and also Paul was one of the designer of SSL 3.0
>specifictations
>
>I just wanted to ask this:
>"when Paul had designed SSL 3.0 Spec, was  the attack
>taken into account?"
>In short please help me reaching the conclusion that
>
>"Is SSL 3.0/TLS susceptible to Pauls Timing Analysis
>Attack"???
>
>Please Reply@Earliest
>Thanks
>Shalendra
>
>__________________________________________________
>Do You Yahoo!?
>Yahoo! Autos - Get free new car price quotes
>http://autos.yahoo.com
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to