Badly implementing encryption: Part VIII-timings attacks and side channels

added by DotNetKicks
2/22/2022 5:24:29 PM

188 Views

In the previous post, I showed some code that compared two MAC values (binary buffers) and I mentioned that the manner in which I did that was bad. Here is the code in question: When you are looking at code that is used in a cryptographic context, you should be aware that any call that compares buffers (or strings) cannot short circuit.


0 comments