[1681] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Kocher timing attacks revisited

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Thu Oct 2 17:58:48 1997

Date: Thu, 2 Oct 1997 17:57:24 -0400 (EDT)
From: "Perry E. Metzger" <perry@piermont.com>
To: cryptography@c2.net
Reply-to: perry@piermont.com


Van Jacobson's PATHCHAR program is a neat creation that determines the
speed of far distant internet links by using statistical techniques on
round trip times -- by noting tiny differences in timing between small
and long packets on distant networks, the distinction between T1s,
T3s, OC3s, etc. can be determined with astonishing accuracy.

Why do I mention this? It occurs to me that the statistical methods he
uses could also, probably, be used to carry out Kocher style timing
measurement attacks on distant servers. I suspect that such attacks
are far less infeasable than has been supposed by many.

Are people using countermeasures for these methods yet, or are they
still ignoring them?

Perry

home help back first fref pref prev next nref lref last post