We see the developers of cryptography software having discussions about how to make their operations constant time. We’ve also been hearing about timing attacks on our CPUs using attacks with fancy names such as Meltdown and Spectre. But what are those timing attacks? And are they anything more then theroretical?
Let’s try to answer this question by demonstrating a timing attack in a very simple way.