If I understand the alleged attack correctly, it depends on the timing 
difference if a standard
byte sequence comparison is "optimized" by exiting as soon as two bytes differ.

Has code been written that actually demonstrates that this can be effective?  
That is, has code
been written to demonstrate that the time to execute, for instance, about two 
instructions
between failure of the byte comparison at the first byte and failure at the 
second byte can
actually be detected over a network?

Attachment: smime.p7s
Description: S/MIME cryptographic signature

_______________________________________________
security mailing list
[email protected]
http://lists.openid.net/mailman/listinfo/openid-security

Reply via email to