Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yeah, timing attacks on string comparison are surprisingly easy, at least if the token/MAC has password-like entropy, not passphrase-like.

To clarify:

The boundary is somewhere around 70 bits where a significant financial incentive or considerable discretionary spending will be required to mount a successful attack.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: