Article 68G8F [$] Constant-time instructions and processor optimizations

[$] Constant-time instructions and processor optimizations

by
corbet
from LWN.net on (#68G8F)
Of all the attacks on cryptographic code, timing attacks may be among themost insidious. An algorithm that appears to be coded correctly, perhapseven with a formal proof of its correctness, may be undermined byinformation leaked as the result of data-dependent timing differences.Both Arm and Intel have introduced modes that are intended to help defendagainst timing attacks, but the extent to which those modes should be usedin the kernel is still under discussion.
External Content
Source RSS or Atom Feed
Feed Location http://lwn.net/headlines/rss
Feed Title LWN.net
Feed Link https://lwn.net/
Reply 0 comments