• Thumbnail for Timing attack
    In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute...
    13 KB (1,616 words) - 12:26, 4 June 2025
  • Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by tracking...
    3 KB (303 words) - 03:45, 5 December 2023
  • security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption...
    31 KB (3,588 words) - 14:14, 13 June 2025
  • A Lucky Thirteen attack is a cryptographic timing attack against implementations of the Transport Layer Security (TLS) protocol that use the CBC mode...
    3 KB (367 words) - 11:37, 22 May 2025
  • "Computing in the Presence of Timing Failures" (PDF). Retrieved 2025-04-11. Wright, Gavin (2023-11-28). "What is a timing attack?". Search Security. Retrieved...
    3 KB (236 words) - 01:36, 16 April 2025
  • Thumbnail for Advanced Encryption Standard
    Bernstein announced a cache-timing attack that he used to break a custom server that used OpenSSL's AES encryption. The attack required over 200 million...
    50 KB (5,679 words) - 15:35, 15 June 2025
  • ciphertext, and so the timing attack fails. In 1998, Daniel Bleichenbacher described the first practical adaptive chosen-ciphertext attack against RSA-encrypted...
    60 KB (7,783 words) - 17:58, 20 June 2025
  • well-known cross-site leaks are timing attacks, which depend on timing events within the web browser. For example, cache-timing attacks rely on the web cache to...
    65 KB (7,518 words) - 03:17, 7 June 2025
  • can be attacked with the Lucky Thirteen attack if the library is not written carefully to eliminate timing side channels. The Sweet32 attack breaks block...
    178 KB (17,519 words) - 23:52, 19 June 2025
  • Dawn Xiaodong; Wagner, David; Tian, Xuqing (2001), "Timing analysis of keystrokes and timing attacks on SSH" (PDF), Proceedings of the 10th Conference on...
    41 KB (5,114 words) - 00:21, 21 January 2024
  • Thumbnail for Spectre (security vulnerability)
    side channel through which an attacker may be able to extract information about the private data using a timing attack. In addition to vulnerabilities...
    83 KB (7,089 words) - 17:59, 16 June 2025
  • Clock drift (category Cryptographic attacks)
    to build random number generators. These can however be exploited by timing attacks. Everyday clocks such as wristwatches have finite precision. Eventually...
    8 KB (1,073 words) - 02:12, 9 February 2025
  • PARASITE, a paper in which they demonstrate practical exploitation of a timing attack over the network. This exploits non-constant implementations of modular...
    28 KB (3,404 words) - 16:06, 8 December 2024
  • on a number of platforms. Käsper and Schwabe described a "Faster and Timing-Attack Resistant AES-GCM" that achieves 10.68 cycles per byte AES-GCM authenticated...
    23 KB (3,051 words) - 20:21, 24 March 2025
  • that authenticates with Elliptic Curves DSA over a binary field via a timing attack. The vulnerability was fixed in OpenSSL 1.0.0e. In August 2013, it was...
    19 KB (2,833 words) - 08:53, 8 May 2025
  • therefore, the attacker can link the flows in one side to the other side of the network and break the anonymity of it. It is shown, although timing noise is...
    21 KB (2,397 words) - 22:53, 13 September 2024
  • Thumbnail for Dan Boneh
    "partially homomorphic cryptosystem". Timing attacks are a type of side-channel attack that allows an adversary to attack a security system by studying now...
    14 KB (1,150 words) - 19:02, 6 February 2025
  • Thumbnail for September 11 attacks
    attempts to push KSM to advance the timing of the crashes. In September of 2000, he urged KSM to tell Atta to attack immediately to respond to the Sharon...
    317 KB (30,079 words) - 17:14, 17 June 2025
  • synchronous digital circuit Dynamic timing analysis Statistical static timing analysis Timing attack, a type of side channel attack on a cryptosystem This disambiguation...
    395 bytes (71 words) - 14:05, 6 March 2024
  • Thumbnail for Paul Carl Kocher
    Internet. He pioneered the field of side-channel attacks, including the development of timing attacks that can break implementations of RSA, DSA and fixed-exponent...
    6 KB (464 words) - 05:03, 24 February 2025
  • Thumbnail for Power analysis
    Power analysis (category Side-channel attacks)
    false; } } return true; } This password check potentially contains a Timing attack, since the execution time is not constant. Observing the power consumption...
    10 KB (1,194 words) - 13:39, 19 January 2025
  • Thumbnail for Cryptography
    Song, Dawn; Wagner, David A.; Tian, Xuqing (2001). "Timing Analysis of Keystrokes and Timing Attacks on SSH" (PDF). Tenth USENIX Security Symposium. Brands...
    100 KB (11,007 words) - 01:11, 20 June 2025
  • Thumbnail for S2n-tls
    variant of the Lucky Thirteen attack against s2n, even though s2n included countermeasures intended to prevent timing attacks. In response, Amazon's s2n...
    7 KB (574 words) - 00:56, 28 May 2025
  • In cybersecurity, pixel stealing attacks are a group of timing side-channel attacks that allow cross-origin websites to infer how a particular pixel is...
    5 KB (494 words) - 16:45, 16 June 2025
  • Thumbnail for Hipercor bombing
    Hipercor bombing (category Attacks on buildings and structures in 1987)
    injured 45, the deadliest attack in ETA's history. Controversy surrounded the timing of telephone warnings made before the attack and the authorities' response...
    15 KB (1,450 words) - 02:14, 19 June 2025
  • speculation can leave traces in the cache, which attackers use to extract data using a timing attack, similar to side-channel exploitation of Spectre...
    6 KB (581 words) - 03:53, 6 February 2025
  • Thumbnail for Hertzbleed
    Hertzbleed (category Side-channel attacks)
    hardware security attack which describes exploiting dynamic frequency scaling to reveal secret data. The attack is a kind of timing attack, bearing similarity...
    5 KB (507 words) - 20:31, 5 January 2024
  • Thumbnail for Meltdown (security vulnerability)
    website by security researcher Anders Fogh outlined the use of a cache timing attack to read kernel space data by observing the results of speculative operations...
    87 KB (8,241 words) - 14:35, 26 December 2024
  • Thumbnail for Threefish
    Threefish uses no S-boxes or other table lookups in order to avoid cache timing attacks; its nonlinearity comes from alternating additions with exclusive ORs...
    10 KB (1,366 words) - 05:34, 17 December 2024
  • Thumbnail for Attack on Pearl Harbor
    The attack on Pearl Harbor was a surprise military strike by the Empire of Japan on the United States Pacific Fleet at its naval base at Pearl Harbor on...
    156 KB (16,393 words) - 14:47, 21 June 2025