Yasuo Ohgaki wrote:
Timing attack can be used to guess hash itself, one by one.
There are many use cases that may be attacked by timing. e.g. API key
This way, unbreakable random hash may be broken relatively easy.
What I am missing Yasuo is a practical example of how this can be actioned as my normal methods would simply delay any following attempt to use a hash after a few failed attempts. That should be normal practice to block a hack attempt?
The wikipedia article provides nothing practical.
--
Lester Caine - G8HFL
-----------------------------
Contact - http://lsces.co.uk/wiki/?page=contact
L.S.Caine Electronic Services - http://lsces.co.uk
EnquirySolve - http://enquirysolve.com/
Model Engineers Digital Workshop - http://medw.co.uk
Rainbow Digital Media - http://rainbowdigitalmedia.co.uk