Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
-
Updated
Dec 31, 2019 - Jupyter Notebook
Benchmarking various constant time algorithms to validate various implementations against side-channel attacks in Golang
This is a proof of concept timing attack using genetic algorithm project for the course nature inspired computing offered at Innopolis University.
This is a demonstration of a simple timing attack used to extract private information
Simulation of a timing covert channel , where a sender transmits a binary message to a receiver and Implementation of Fiestel-based algorithm.
Timing attack for pin
Enumeration-resistant stable IDs
simulation of a timing covert channel , where a sender transmits a binary message to a receiver without directly sending data.
For side channel attack countermeasures. Currently script to prevent power analysis or timing analysis of password comparison.
Overview and POC? of how timing attacks work in a network environment as well as in the context of hardware security. 💻
Comprehensive timing leak protection for Rust programs https://www.chosenplaintext.ca/open-source/rust-timing-shield/
This is a quick demonstration of how authentication shouldn't use strcmp (or other non-time-compensated methods)
A super simple script demonstrating linearity in password length and time required for cracking using a timing attack.
ECE458 Assignments
timing-attack demo in python
Testing the Rust crypto library orion with sidefuzz
Add a description, image, and links to the timing-attacks topic page so that developers can more easily learn about it.
To associate your repository with the timing-attacks topic, visit your repo's landing page and select "manage topics."