RE: Timing attack against AES

2005-05-24 Thread Ryan Malayter
[Jean-David Beyer] > Aside from the necessity to compromise the machine running > gpg to get the > timing data for this attack, > just how much data can a timing attack retrieve from a > multiprogramming > system, such as UNIX, Linux, etc., anyway, since all the > other processes > running at th

Re: Timing attack against AES

2005-05-24 Thread Jean-David Beyer
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Aside from the necessity to compromise the machine running gpg to get the timing data for this attack, just how much data can a timing attack retrieve from a multiprogramming system, such as UNIX, Linux, etc., anyway, since all the other processes runn

Re: Timing attack against AES

2005-05-24 Thread Werner Koch
Hi! Ryan, thanks for explaining this. I agree with you. Let me add that this is a classical type of side-channel attack and nothing really new. It is a general problem to hide things from other processes when sharing hardware. It is possible to make it hard but there won't never be perfect sol

RE: Timing attack against AES

2005-05-23 Thread Ryan Malayter
[Per Tunedal Casual] > 2) Are any other ciphers safer to this kind of attack? What about the > ciphers in OpenPGP applications? Other AES candidates? >From my reading of it, it looks like any cipher with data-dependent S-boxes would seem to be susceptible to this class of attack. I think that w

Timing attack against AES

2005-05-21 Thread Per Tunedal Casual
Hi, Bruce Schneier presented in his blog a few days ago a new attack against AES made by Daniel J. Bernstein. Schneier's blog "AES Timing Attack": http://www.schneier.com/blog/ Bernstein's paper: "Cache timing attacks on AES": http://cr.yp.to/antiforgery/cachetiming-20050414.pdf In short Ber