Get a Pentest and security assessment of your IT network.

Cyber Security

Timing attack in Google Keyczar library

An attacker could forge signatures for data that was signed with the SHA-1 HMAC algorithm (the default algorithm) The HMAC verify function leaked timing information based on how long a verify operation took to fail. This allows an attacker to iteratively try various HMAC values and see how long it takes the server to respond. The longer it takes, the more characters he has correct characters. The lesson from this is that crypto flaws can be very subtle, especially when it comes to transitioning from an abstract concept to a concrete implementation.

Source: https://threatpost.com/timing-attack-google-keyczar-library-060209/72738/

Related posts
Cyber Security

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

Cyber Security

Art of Twitter account hacking

Cyber Security

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate

Cyber Security

Dan Geer, Richard Thieme on specialization in security