An attack on a cryptographic system that exploits the
fact that different cryptographic operations take slightly different amounts of
time to process. The attacker exploits these slight time differences by
carefully measuring the amount of time required to perform private key
operations. Taking these measurements from a vulnerable system can reveal the
entire secret key. Cryptographic tokens, network-based cryptosystems, and other
applications where attackers can make reasonably accurate timing measurements
are potentially at risk from this form of attack.
Home »
Computers-Basics
» What is timing attack?
What is timing attack?
PMA12:21
Categories: Computers-Basics
Related Posts:
what is X Series for Network Communications A set of recommendations adopted by the International Telecommunication Union Telecommunication Standardization Sector ITU-T, formerly the CCITT, and International Organization for Standardization ISO for standardizing eq… Read More
What is MIME? Acronym for Multipurpose Internet Mail Extensions. A protocol widely used on the Internet that extends the SMTP Simple Mail Transfer Protocol to permit data, such as video, sound, and binary files, to be transmitted by In… Read More
What is memory management? In operating systems for personal computers, procedures for optimizing the use of RAM (random access memory). These procedures include selectively storing data, monitoring it carefully, and freeing memory when the data is … Read More
Whst is Password Authentication Protocol Acronym for Password Authentication Protocol. A method for verifying the identity of a user attempting to log on to a Point-to-Point Protocol (PPP) server. PAP is used if a more rigorous method, such as the Challenge Hand… Read More
Whai is macro? In applications, a set of keystrokes and instructions recorded and saved under a short key code or macro name. When the key code is typed or the macro name is used, the program carries out the instructions of the macro. Us… Read More
what is three-tier client/server? A client/server architecture in which software systems are structured into three tiers or layers: the user interface layer, the business logic layer, and the database layer. Layers may have one or more components. For exa… Read More
What is markup language? A set of codes in a text file that instructs a computer how to format the file on a printer or video display or how to index and link its contents. Examples of markup languages are Hypertext Markup LanguageHTML and Extens… Read More
Os registry? A central hierarchical database in Windows 9x, Windows CE, Windows NT, and Windows 2000 used to store information necessary to configure the system for one or more users, applications, and hardware devices. The Registry c… Read More
what is ANSI? Acronym for American National Standards Institute. A voluntary, nonprofit organization of business and industry groups formed in 1918 for the development and adoption of trade and communication standards in the United Stat… Read More
What is ini file? ini file:-Short for initialization file, a text file containing information about the initial configuration of Windows and Windows-based applications, such as default settings for fonts, margins, and line spacing. Two ini… Read More
What is GPS receiver? A device that includes an antenna, a radio receiver, and a processor for use with the worldwide GPS -Global Positioning System. A GPS receiver uses position and time information from four GPS satellites to calculate preci… Read More
.NET Framework A platform for building, deploying, and running XML Web services and applications. It provides a highly productive, standards-based, multilanguage environment for integrating existing investments with next generation appl… Read More
Absolute pointing device A mechanical or physical pointing device whose location is associated with the position of the on-screen cursor. For example, if the user of a graphics tablet places the pen on the upper right corner of the tablet, the cu… Read More
What is modem? Short for modulator/demodulator. A communications device that converts between digital data from a computer or terminal and analog audio signals that can pass through a standard telephone line. Because the telephone syst… Read More
why need For a relational database? A database or database management system that stores information in tables—rows and columns of data—and conducts searches by using data in specified columns of one table to find additional data in another table. In a rela… Read More