Re: Covert Channels

From: David Wagner (dawat_private)
Date: Thu Oct 24 2002 - 10:48:47 PDT

  • Next message: Sean Zadig: "Re: shellcode -> asm?"

    Jose Nazario  wrote:
    >as an example, consider the timing attack on cryptography. you can roughly
    >estimate the size of cryptographic keys by watching processor timings.
    
    I wouldn't call that a covert channel; that's an inadvertent leakage.
    Covert channels are where the leaker is maliciously attempting to
    leak data.  In contrast, side channels in crypto are a case where the
    leaker didn't intend to be malicious or to leak data, but inadvertently
    let some data slip anyway.  Not all information leaks are covert channels.
    



    This archive was generated by hypermail 2b30 : Thu Oct 24 2002 - 11:15:53 PDT