| •owl:Thing |
| •sec:Threat |
| •sec:Disclosure |
| •sec:PassiveAttack |
| •sec:PassiveAttack |
| •sec:Disclosure |
| •sec:SideChannelAttack |
| •sec:TimingAttack |
| dc:description | A timing attack is a form of side channel attack where the attacker tries to break a cryptosystem by analyzing the time taken to execute cryptographic algorithms. The attack exploits the fact that, particularly in asymmetric key algorithms, computation time for a private key operation is dependent on the key in some way. (Wikipedia) (Term also badly explained in ODotI) |
Class(sec:TimingAttack partial sec:SideChannelAttack)