lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAOLP8p7id+0+o5pArhYSKL6Hx1VuUhNOJ3R9EG5_wkJ5O4_X1A@mail.gmail.com>
Date: Wed, 8 Jan 2014 20:36:24 -0500
From: Bill Cox <waywardgeek@...il.com>
To: discussions@...sword-hashing.net
Subject: Re: [PHC] A final cheat killer pass with smoke
That's what the "smoke" is for. If all an attacker has access to is cache
miss timing, then simply randomizing the order of of memory access would
make it virtually impossible to gain information from the timing.
Content of type "text/html" skipped