Timing attacks

Timing attacks extract your confidential data from observations of the time used by your computer. Timing attacks have been demonstrated again and again to successfully extract complete cryptographic keys and other secrets.

This web site, timing.attacks.cr.yp.to, is aimed at end users, operating-system distributors, CPU manufacturers, and software engineers who would like to know what they can do to protect data against timing attacks.

Authors

Daniel J. Bernstein has coauthored more than 50 attack papers on a wide range of cryptographic topics, including the influential paper "Cache-timing attacks on AES", but he works primarily on protecting systems against attack. His fast high-security Curve25519 and ChaCha20 cryptographic algorithms are now used every day by billions of people. These algorithms were designed from the outset to help systems engineers stop timing attacks.

Billy Bob Brumley works primarily on attacking systems using timing as a side channel, protection being a by-product. On the offense side, he coinvented / codiscovered / codeveloped

On the defense side, his implementations of cryptographic algorithms are now used every day by billions of people, including (but not limited to) his free and open-source software (FOSS) contributions to OpenSSL and Mozilla's NSS / Firefox / Thunderbird.


Version: This is version 2022.06.19 of the "Introduction" web page.