First page Back Continue Last page Summary Graphic
16. Use time as a Covert Channel
Observe the time taken to do encryption using peoples' private keys
Analyze the time differentials for different things encrypted to derive the private key bits.
Notes: