Title : 
Network Service Authentication Timing Attacks
         
        
        
        
        
        
        
        
        
            Abstract : 
The common wisdom is that string comparison timing attacks against a hashed password are impossible. However, these attacks can still be effective if attackers give up on the ideal of stealing all the characters representing the user´s password or the entire hash.
         
        
            Keywords : 
cryptography; message authentication; hashed password; network service authentication; network service authentication timing attacks; string comparison timing attacks; Access control; Authentication; Computer security; Network security; SHA-1; computer security; hash functions; network service authentication timing attacks; side-channel attacks; timing attacks;
         
        
        
            Journal_Title : 
Security & Privacy, IEEE
         
        
        
        
        
            DOI : 
10.1109/MSP.2013.39