Successful timing attacks on elliptic curve cryptography
From http://www.h-online.com/security/new...y-1247772.html
Quote:
Researchers Billy Bob Brumley and Nicola Tuveri have used a "timing attack" to calculate the secret key of a TLS/SSL server which uses the Elliptic Curve DSA. The attack is based on the idea that the time required for performing a multiplication allows conclusions to be drawn about the multiplication's operands.
|
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump
|