On Wed, 18 Sep 2019 at 02:19, Paul Koning via cctalk
<cctalk@classiccmp.org> wrote:
> > ...
> Speaking of timing, that reminds me of two amazing security holes written up 
> in the past few years.  Nothing to do with the Spectre etc. issue.
>
> One is the recovery of speech from an encrypted VoIP channel such as Skype, 
> by looking at the sizes of the encrypted data blocks.  (Look for a paper 
> named "Hookt on fon-iks" by White et al.)  The fix for this is message 
> padding.
>
> The other is the recovery of the RSA private key in a smartphone by listening 
> to the sound it makes while decrypting.  The fix for this is timing tweaks in 
> the decryption inner loop.  (Look for a paper by, among others, Adi Shamir, 
> the S in RSA and one of the world's top cryptographers.)
>
> It's pretty amazing what ways people find to break into security mechanisms.

... Wow.

*Wow.*

Thanks for those!

-- 
Liam Proven - Profile: https://about.me/liamproven
Email: lpro...@cix.co.uk - Google Mail/Hangouts/Plus: lpro...@gmail.com
Twitter/Facebook/Flickr: lproven - Skype/LinkedIn: liamproven
UK: +44 7939-087884 - ČR (+ WhatsApp/Telegram/Signal): +420 702 829 053

Reply via email to