132k views
1 vote
The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption, but can be adapted to work with any implementation that does not run in fixed time.

User Drobati
by
8.1k points

1 Answer

6 votes

Answer:

The answer is "timing".

Step-by-step explanation:

  • The time attack would be a security vulnerability that enables attackers that identify computer systems or network security issues by analyzing the period of the program's reaction to multiple levels.
  • It is used in both RSA encryption and decryption of the modular exponentiation method but could be modified for just about any system not seem running in a fixed period.
User Dmitriy Ivanov
by
8.5k points