What is a timing attack?

What will be an ideal response?


In a timing attack, the attacker eavesdrops during a victim's session and uses statistical analysis of the user's typing patterns and inter-keystroke timings to discern sensitive session information. While timing analysis may not directly result in the decryption of sensitive data, it can be used to gain information about the encryption key and perhaps the cryptosystem in use. It may also eliminate some algorithms as possible candidates, thus narrowing the attacker's search. In this narrower field of options, the attacker can increase the odds of eventual success. Once the attacker has successfully broken an encryption, he or she may launch a replay attack, which is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source.

Computer Science & Information Technology

You might also like to view...

The ________ button totals several row of related data together by automatically inserting subtotals and totals for the selected cells

Fill in the blank(s) with correct word

Computer Science & Information Technology

________Browsing, a feature of Windows Internet Explorer 8, helps to protect data and privacy by preventing the browsing history, temporary Internet files, form data, cookies, and usernames/passwords from being stored or retained locally by the browser, leaving virtually no evidence of the user's browsing or search history

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The cell being copied is called the source area (or copy area). The range of cells receiving the copy is called the _____.

A. receiver cell B. final cell C. receiving range D. destination area (or paste area)

Computer Science & Information Technology

Why must both a copy constructor and a virtual destructor be used in implementing a stack with a linked list?

What will be an ideal response?

Computer Science & Information Technology