We see the developers of cryptography software having discussions about how to make their operations constant time. We’ve also been hearing about timing attacks on our CPUs using attacks with fancy names such as Meltdown and Spectre. But what are those timing attacks? And are they anything more then theroretical?
Let’s try to answer this question by demonstrating a timing attack in a very simple way.
Citation
If you find this work useful, please cite it as:
@article{yaltirakliwikitimingattacks,
title = "Timing attacks",
author = "Yaltirakli, Gokberk",
journal = "gkbrk.com",
year = "2024",
url = "https://www.gkbrk.com/wiki/timing_attacks/"
}
Not using BibTeX? Click here for more citation styles.
IEEE Citation Gokberk Yaltirakli, "Timing attacks", December, 2024. [Online]. Available: https://www.gkbrk.com/wiki/timing_attacks/. [Accessed Dec. 17, 2024].
APA Style Yaltirakli, G. (2024, December 17). Timing attacks. https://www.gkbrk.com/wiki/timing_attacks/
Bluebook Style Gokberk Yaltirakli, Timing attacks, GKBRK.COM (Dec. 17, 2024), https://www.gkbrk.com/wiki/timing_attacks/