This commit is contained in:
Ahmed Farid
2022-08-29 18:18:19 +01:00
committed by GitHub
parent 199e3d9462
commit 141b65fea8

View File

@@ -6,7 +6,7 @@
Timing Attack is based on the leakage of information by studying how long it takes the system to respond to different inputs.
it can be circumvented by using a constant-time algorithm for checking the value of Hash,
more precisely, the comparison time should not depend on the content of the input. Otherwise the attacker gains
information that is indirectly leaked by the application. This information is then used for malicious purposes.
information that is indirectly leaked by the application. This information may then be used for malicious purposes.
</p>
</overview>