Re: an advise

2002-07-17 Thread Paul Kocher
Timing attacks are primarily an implementation issue, rather than a protocol issue. The SSL 3.0 spec doesn't try to describe all the things that implementations need to do in order to be secure, as this would have been far too complex and implementation-specific to include. Having said this, I

Re: an advise

2002-07-16 Thread Perry E. Metzger
Michael Sierchio <[EMAIL PROTECTED]> writes: > I didn't mean to claim that no one would ever mount such an attack -- > just that there are enormous practical difficulties to getting any > timing results via SSL session key creation. Not really. The bad scenario is someone breaking in to a poorly

Re: an advise

2002-07-16 Thread Michael Sierchio
Perry E. Metzger wrote: > Michael Sierchio <[EMAIL PROTECTED]> writes: > >>Timing analysis is of such little practical value that no one, to >>my knowledge, is willing to obscure the average key agreement (DH) >>or decryption (RSA) operation by adding random delays or by making >>all pubkey opera

Re: an advise

2002-07-16 Thread Perry E. Metzger
Michael Sierchio <[EMAIL PROTECTED]> writes: > Timing analysis is of such little practical value that no one, to > my knowledge, is willing to obscure the average key agreement (DH) > or decryption (RSA) operation by adding random delays or by making > all pubkey operations conform to the upper b

Re: an advise

2002-07-16 Thread Michael Sierchio
Kocher did work on the SSL v3.0 protocol, which corrects some errors in the previous version. At the risk of repeating myself, timing or power analysis attacks are not mounted against SSL, but against the public key operations. Given the nature of their place in the protocol, and that -- even i

Re: an advise

2002-07-16 Thread Manish Ramesh Chablani
>Date: Mon, 15 Jul 2002 16:08:22 -0700 (PDT) >From: Shalendra Chhabra <[EMAIL PROTECTED]> >Subject: an advise >To: [EMAIL PROTECTED], [EMAIL PROTECTED], [EMAIL PROTECTED] >MIME-Version: 1.0 >X-Sender: Shalendra Chhabra <[EMAIL PROTECTED]> >X-List-Manager: OpenSSL Majord

Re: an advise

2002-07-16 Thread Michael Sierchio
Shalendra Chhabra wrote: > "Is SSL 3.0/TLS susceptible to Pauls Timing Analysis > Attack"??? The protocols do not address the issue in any way -- this is an implementation problem for the Public Key Crypto component. __ OpenSSL