In cryptography, a timing attack is a side channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute cryptographic algorithms. Every logical operation in a computer takes time to execute, and the time can differ based on the input; with precise measurements of the time for each operation, an attacker can work backwards to the input.
Information can leak from a system through measurement of the time it takes to respond to certain queries. How much such information can help an attacker depends on many variables: crypto system design, the CPU running the system, the algorithms used, assorted implementation details, timing attack countermeasures, the accuracy of the timing measurements, etc.
Timing attacks are often overlooked in the design phase because they are so dependent on the implementation.
Famous quotes containing the words timing and/or attack:
“A great man always considers the timing before he acts.”
—Chinese proverb.
“...I believed passionately that Communists were a race of horned men who divided their time equally between the burning of Nancy Drew books and the devising of a plan of nuclear attack that would land the largest and most lethal bomb squarely upon the third-grade class of Thomas Jefferson School in Morristown, New Jersey.”
—Fran Lebowitz (b. 1950)