Reading time: less than 1 minute
We see the developers of cryptography software having discussions about how to make their operations constant time. We’ve also been hearing about timing attacks on our CPUs using attacks with fancy names such as Meltdown and Spectre. But what are those timing attacks? And are they anything more then theroretical?
Let’s try to answer this question by demonstrating a timing attack in a very simple way.
If you find this work useful, please cite it as:
title = "Timing attacks",
author = "Yaltirakli, Gokberk",
journal = "gkbrk.com",
year = "2022",
url = "https://www.gkbrk.com/wiki/timing_attacks/"
Not using BibTeX? Click here for more citation styles.
Gokberk Yaltirakli, "Timing attacks", January, 2022. [Online]. Available: https://www.gkbrk.com/wiki/timing_attacks/. [Accessed Jan. 13, 2022].
Yaltirakli, G. (2022, January 13). Timing attacks. https://www.gkbrk.com/wiki/timing_attacks/
Gokberk Yaltirakli, Timing attacks, GKBRK.COM (Jan. 13, 2022), https://www.gkbrk.com/wiki/timing_attacks/