Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 13 May 2005 18:15:02 +0200
From:      "Poul-Henning Kamp" <phk@phk.freebsd.dk>
To:        David Schultz <das@FreeBSD.ORG>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-05:09.htt [REVISED] 
Message-ID:  <63567.1116000902@critter.freebsd.dk>
In-Reply-To: Your message of "Fri, 13 May 2005 12:07:14 EDT." <20050513160714.GB32677@VARK.MIT.EDU> 

next in thread | previous in thread | raw e-mail | index | archive | help
In message <20050513160714.GB32677@VARK.MIT.EDU>, David Schultz writes:

>But isn't this a well-known and fundamental problem with SMT?

Yes.

The news being only the speed: you can get 300 bits of the 512 bit
RSA key in a single observation of a single shot run of the crypto.

-- 
Poul-Henning Kamp       | UNIX since Zilog Zeus 3.20
phk@FreeBSD.ORG         | TCP/IP since RFC 956
FreeBSD committer       | BSD since 4.3-tahoe    
Never attribute to malice what can adequately be explained by incompetence.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?63567.1116000902>