Chosen / Timing / Time-based Attacks (Side-channels)

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

Attacker measures how long cryptographic operations take and infers secret data from timing variations.

(Timing Attack) – “Watch the clock.” If differing execution times leak key bits, mitigate with constant-time ops and blinding.

2
New cards

Some systems seed keys or OTPs from system time; changing or resetting the clock can let an attacker reproduce keys.

(Time-Resetting Attack) – “Turn back the clock.” If time is used for key/seed generation, ensure clock integrity and use stronger entropy sources.

3
New cards

Attacker supplies ciphertexts and obtains decryptions (oracle) to exploit padding or protocol behavior (a subtype of CCA).

(Padding Oracle Attack) – “Server reaction reveals padding validity.” If server errors differ by padding correctness, this is likely.

4
New cards

.

.