Chosen / Timing / Time-based Attacks (Side-channels)

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:19 PM on 10/23/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

4 Terms

1
New cards

Attacker measures how long cryptographic operations take and infers secret data from timing variations.

(Timing Attack) – “Watch the clock.” If differing execution times leak key bits, mitigate with constant-time ops and blinding.

2
New cards

Some systems seed keys or OTPs from system time; changing or resetting the clock can let an attacker reproduce keys.

(Time-Resetting Attack) – “Turn back the clock.” If time is used for key/seed generation, ensure clock integrity and use stronger entropy sources.

3
New cards

Attacker supplies ciphertexts and obtains decryptions (oracle) to exploit padding or protocol behavior (a subtype of CCA).

(Padding Oracle Attack) – “Server reaction reveals padding validity.” If server errors differ by padding correctness, this is likely.

4
New cards

.

.

Explore top flashcards

AP Psych: Unit 0
Updated 529d ago
flashcards Flashcards (78)
BIOL 460 Exam 1
Updated 1111d ago
flashcards Flashcards (69)
Science exam
Updated 966d ago
flashcards Flashcards (167)
Vocab. 251-300
Updated 1013d ago
flashcards Flashcards (50)
ICT
Updated 1107d ago
flashcards Flashcards (55)
AP Psych: Unit 0
Updated 529d ago
flashcards Flashcards (78)
BIOL 460 Exam 1
Updated 1111d ago
flashcards Flashcards (69)
Science exam
Updated 966d ago
flashcards Flashcards (167)
Vocab. 251-300
Updated 1013d ago
flashcards Flashcards (50)
ICT
Updated 1107d ago
flashcards Flashcards (55)