DocumentCode
5797
Title
Network Service Authentication Timing Attacks
Author
Hayes, Austen
Volume
11
Issue
2
fYear
2013
fDate
March-April 2013
Firstpage
80
Lastpage
82
Abstract
The common wisdom is that string comparison timing attacks against a hashed password are impossible. However, these attacks can still be effective if attackers give up on the ideal of stealing all the characters representing the user´s password or the entire hash.
Keywords
cryptography; message authentication; hashed password; network service authentication; network service authentication timing attacks; string comparison timing attacks; Access control; Authentication; Computer security; Network security; SHA-1; computer security; hash functions; network service authentication timing attacks; side-channel attacks; timing attacks;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2013.39
Filename
6493330
Link To Document