Timing attacks break a MAC verification faster than brute force. Leaking the number of bytes a MAC contains gives the attacker nothing new.
-
-
Replying to @csprngoutput
@voodooKobra Anyone disagree?@ircmaxell@zooko@jedisct1@DefuseSec@tqbf@adamcaudill@CodesInChaos@bascule2 replies 0 retweets 0 likes
Replying to @csprngoutput
@voodooKobra But knowing the length doesn’t help much. In a timing attack you sequentially learn each bit or byte anyway.
3:21 AM - 25 Mar 2015
0 replies
0 retweets
1 like
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.