Title :
Network Service Authentication Timing Attacks
Abstract :
The common wisdom is that string comparison timing attacks against a hashed password are impossible. However, these attacks can still be effective if attackers give up on the ideal of stealing all the characters representing the user´s password or the entire hash.
Keywords :
cryptography; message authentication; hashed password; network service authentication; network service authentication timing attacks; string comparison timing attacks; Access control; Authentication; Computer security; Network security; SHA-1; computer security; hash functions; network service authentication timing attacks; side-channel attacks; timing attacks;
Journal_Title :
Security & Privacy, IEEE
DOI :
10.1109/MSP.2013.39