(09.04.04 17:03) You can find a 8051 Development Board here: http://www.pjrc.com/tech/8051/board5/schematic.html Complete stuff with high quality PDF http://www.pjrc.com/tech/8051/board5/schematic_printable.pdf It turns out to be an interesting dev board considering that it has 50 I/O lines an LCD socket. About 7805 title: Ipaq - Open Source Operating Systems and Software for the Compaq iPAQ Handhelds.: Re: [iPAQ] External batteries http://handhelds.org/hypermail/ipaq/136/13641.html It clears up (a bit) about the typical capacitors for application (230404 05:34) http://www.keil.com/support/docs/2112.htm Serial log to save serial window debugger http://www.keil.com/support/docs/2262.htm Automated serial input script http://www.keil.com/support/docs/1944.htm Using the SIN in debugger to input the serial window The complete FAQ list for debugger : http://www.keil.com/uvision2/debuggerfaq.asp (240404 22:12) http://www.usenix.org/publications/library/proceedings/smartcard99/full_papers/daemen/daemen_html/ Publication of the fastest Rijndael implentation using 8051 assembly on USENIX smartcards the 3744 cycles is similar to the one mentioned in Rijndael.pdf (the original proposal for AES) But it also explained specific smartcard attacks: timing attack and simple power analysis attack http://xtronics.com/kits/ccode.htm Reading capacitor value D:\bandono\Development Board\8051 Development System Circuit Board3.htm Power on reset circuit is used here, copyable to our own development board (270404 08:05) http://www.arcelect.com/rs232.htm All about RS232 the various standards, mech. and elec. char. etc. U can find whole bunch of it. (010504 10:57) http://www.usenix.org/publications/library/proceedings/smartcard99/full_papers/daemen/daemen_html/ THIS IS A FULLY-USEFUL AES-IMPLEMENTATION INFO OVER 8051 smartcard, where the multiplication technic is done by using table aX02h (020504 02:24) http://www.emosyn.atmi.com/Uploads/TheseusPlatinum100datasheetv0.5.pdf ..to be save in datsheet One of 8051 smart card chip http://www.phaedsys.demon.co.uk/chris/cipher/ciphers.htm link to DES-C & asm for 8051available free at www.dbasko.com who also has some useful cipher code (020504 23:44) http://www.gemplus.com/smart/r_d/publications/pdf/GT03perm.pdf ..Something about: againts power analysis attacks on AES... but vulnarable to differential attack (070504 10:23) http://www.ja.axxs.net/unlock/interface_not_working.htm ...On troubleshooting the PC-uC connection (MAX232 characteristic) (070504 12:55) Adding some previous search result: http://www.physics.otago.ac.nz/electronics/papers/WardMolteno103.pdf mentioning PIC implementation with evaluation PER TRANSFORMATION http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Adata+security few definit. of data security define: cryptography http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Acryptography define: module http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Amodule define:primitives http://www.google.com/search?hl=en&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Aprimitives http://www.nist.gov/modes/ 5 confidentiality modes and an authentification mode define:bitwise http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Abitwise (080504 13:39) http://www.xilinx.com/bvdocs/appnotes/xapp374.pdf cryptographer always worry about attack.... NONE CODE ATTACK: power analysis and tempest. http://www.semiconductor.com/products_and_services/techinsights/smart_card_analysis.asp?c=8484 IC security evaluation. Its also a PRODUCT CLAIM for security..majoring: reverse eng., fault injection, info leakage And link to deocument smart_card_ic_evaluation.pdf and rethinking_smart_card_security_evaluations.pdf http://www.atmel.com/products/SecureM68HC05/overview.asp ..AT05SC family which owned ISO15408 Security Standard.. protection againts physical attack, SPA, DPA and other attack. Dedicated hardware to resist power analysis. http://www.silicon-trust.com/pdf/secure_5/40_techno_3.pdf More about how the attack is found and explanation of SPA (Simple Power Analysis) and DPA (Differential Power Analysis. THIS IS REALLY AN ENLIGHMENT FOR NEWBIES-CRYPTOGRAPHER. HIGH READIBILITY AND COMPEHENSIVE, friendly language http://www.crypto.ruhr-uni-bochum.de/Publikationen/texte/aes_collisions.ps A Collision-Attack on AES Combining Sidechannel- and Diferential-Attack ...wow define: implementation http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Aimplementation http://csrc.nist.gov/publications/ link to NIST publiaction on computer security http://www.math.uwaterloo.ca/~jamuir/sidechannel.htm About side channel attack (080504 18:11) define:computation http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Acomputation define:base http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Abase define:script http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Ascript (090504 08:26) http://csrc.nist.gov/cryptval/ cryptographic module validation program AES Known Answer Test (KAT) Vectors - This file provides an electronic version of the KAT vectors that can be used to informally verify the correctness of an AES algorithm implementation, using the Known Answer Test (KAT) described in The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). However, use of these vectors does not take the place of validation obtained through the Cryptographic Module Validation Program. fips1402 on security requirements ..defining 4 security level of cryto module Known Answer Test (KAT) and Monte Carlo Test (MCT) Information: http://csrc.nist.gov/CryptoToolkit/aes/katmct/katmct.htm katmct.pdf : Description of Known Answer Tests and Monte Carlo Testsfor Advanced Encryption Standard (AES) Candidate Algorithm Submissions ....the submitter of AES must include KAT in their proposal http://csrc.nist.gov/cryptval/aes/aesval.html Advanced Encryption Standard Algorithm Validation List (Last Update: May 5, 2004) The list describes implementations which have been validated as correctly implementing the AES algorithm, using the tests found in The Advanced Encryption Standard Algorithm Validation Suite (AESAVS). -> AESAVS.pdf (100504 21:21) define:figure of merit http://www.google.com/search?q=define%3Afigure+of+merit&hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1 define:throughput http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Athroughput define:performance http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Aperformance+ define:figure http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Afigure define:microcontroller http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Amicrocontroller define:microprocessor http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Amicroprocessor http://www.dice.ucl.ac.be/crypto/CAESAR/caesar.html Link to implementation of 4 AES candidates on 2 smartcards smartcards.ps (110504 18:39) AES noise purity tests results http://www.purenoise.com/html/aes_tests.html Kim Sung Ha.. http://www.ee.ucla.edu/~yevgeny/right_frame.html http://www.ee.ucla.edu/~yevgeny/research/session_key[rtss].pdf Noting to do with AES (120504 08:41) define:invocation http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&oe=ISO-8859-1&q=define%3Ainvocation (120504 21:09) http://e-www.motorola.com/webapp/sps/site/taxonomy.jsp?nodeId=03t3ZGpnLn84498634 I also downloaded a datasheet MC68HC908JL8.pdf (190504 10:47) the adage, "CPU time is cheaper than engineer time." Optimizing a given algorithm is labor intensive http://www.sciencedaily.com/encyclopedia/brute_force The birthday paradox http://efgh.com/math/birthday.htm http://www.itsecurity.com/dictionary/bday.htm The interesting fact about the 2nd one is that it is a security dictionary And also available a DOWNLOADABLE ITSECURITY DICT. A GOOD TUTOR. on power analysis.. one of the figure is describing power measure on MOV 0 and MOV FF.. practical implementation of DPA on 89s8252 applying DES http://www.iaik.tu-graz.ac.at/aboutus/people/oswald/papers/dpa_tutorial.pdf (200504 00:15) http://www.digicrypto.com/products_smart_card.htm Smart card with AT90SC.. processor and Infineon SLE66.. chip Index of Cryptography papers available online http://www.schneier.com/biblio/index.html Diferential Power Analysis of Smartcards (Ryan Junee) http://www.ee.usyd.edu.au/~mattb/DPA_Conversazione.doc we have it in PDF now about SIDE CHANNEL.. specifically smart card using memories http://www.dice.ucl.ac.be/~mneve/document/Publications/sisw03.pdf http://ca.itsc.ruhr-uni-bochum.de/hgi/smaca/bochum2003-schindler.pdf Ryan Junee slides of the work http://www.ee.usyd.edu.au/~rjunee/sc_side_channel.pdf Case studies: DPA WHO CRACK DES less than 1.6 hours of computing POTENTIAL HINT AGAINTS SIDE CHANNEL ATTACK http://www.springerlink.com/index/A5PCFL6RU5714YHK.pdf BUT U'LL HAVE TO PAY TO DOWNLOAD..huSSH! (210504 14:30) A Collision-Attack on AES Combining Sidechannel- and Differential..... http://www.crypto.ruhr-uni-bochum.de/Publikationen/texte/aes_collisions.ps A collision attack on 7 rounds of Rijndael http://csrc.nist.gov/encryption/aes/round2/conf3/papers/11-hgilbert.pdf just a proposal of new mode for block cipher http://csrc.nist.gov/encryption/modes/proposedmodes/ccm/ccm.pdf (220504 14:20) Quiz solution? http://www.cs.ucsd.edu/users/mihir/cse107/qs1.pdf Apparently WinZip USES AES http://slashdot.org/articles/04/05/16/1515216.shtml?tid=126&tid=172 here is a quote "Everything sounded good since we all knew that AES is secure, right? Well, a cryptographer took a look at how WinZip uses AES and found lots of problems. Regardless of how many people actually plan to use WinZip encryption, the lesson, according to Schneier, is that "cryptography is hard, and simply using AES in a product does not magically make it secure." So how can we distinguish between an application that simply uses the right buzzwords, like AES, from an application that is actually secure?" Btw, SlashDot provides infos for Nerds :P http://www.winzip.com/aes_info.htm Start page http://www.winzip.com/aes_tips.htm Coding tips Finally I found something POPULAR UTILIZE AES Abstract of the paper regarding attack to WinZip http://www.cse.ucsd.edu/users/tkohno/papers/WinZip/ http://www.cse.ucsd.edu/users/tkohno/papers/WinZip/winzip.pdf the paper itself NIST background ... support private sectors... http://www.nist.gov/public_affairs/releases/g00-176.htm Does collision exists in AES? http://www.mail-archive.com/cryptography@wasabisystems.com/msg03602.html Provides some countermeasure strategy for Timing Attack..intuitively and efficiently http://www.win.tue.nl/~henkvt/timing_attack.pdf cached link to Dhem' paper. Dhem did a timing attack on RSA Suggested as well COUNTERMEASURE http://citeseer.ist.psu.edu/rd/98588148%2C54504%2C1%2C0.25%2CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/2622/http:zSzzSzwww.dice.ucl.ac.bezSzcryptozSztech_reportszSzCG1998_1.pdf/dhem98practical.pdf Power analysis COUNTERMEASURES and their WEAKNESS presentations slides http://www.iccip.csl.uiuc.edu/conf/ceps/2000/messerges.pdf Securing AES againts 2nd order DPA by simple fixed value...Hwasun Chang http://caislab.icu.ac.kr/paper/2003/CSS2003/CSS2003hschang.pdf A Study on securing AES against DPA this is the full thesis version of the above paper CSS2003hschang.pdf of course it is more 'fun' to read the paper http://caislab.icu.ac.kr/pub/down/2004/w20022122_chs.pdf This site is devoted to things related to Xxchen master's degree thesis on DPA http://optimal.vlsi.uwaterloo.ca/~xxchen/Research.htm AES: Learn all about it http://slashdot.org/articles/01/02/22/218229.shtml Why federal standards? Private sectors? Commerce? (250504 0409) Comparison: AVR-8051 http://www.specs.de/users/danni/avr/compars.htm (250504 19:01) PIC16F8 datasheets http://www.goldenchip.com.cn/icinfo/pic/pdf/39598c.pdf (270504 07:08) Just an example of throughput calculation in the network http://www.thetechfirm.com/nai_sniffer/throughput.ppt Kocher was the original INVENTOR OF DPA... the follower papers always refer to his work http://citeseer.ist.psu.edu/rd/98588148%2C263090%2C1%2C0.25%2CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/12723/http:zSzzSzwww.cryptography.comzSzdpazSz..zSzdpazSzDpa.pdf/kocher99differential.pdf define:firmware http://www.google.com/search?hl=en&lr=&ie=ISO-8859-1&q=define%3Afirmware Tools for Authors....IEEE paper format http://www.ieee.org/portal/index.jsp?pageID=corp_level1&path=pubs/transactions&file=information.xml&xsl=generic.xsl (280504 06:59) 70% of the population will trade their computer password for a bar of chocolate http://www.securityfocus.com/columnists/245 http://www.phaedsys.demon.co.uk/chris/files/ISO7816.doc clear enough :) PKI?...a picture of USB card reader http://www.it-secure.com/html/smart%20cards.htm FAQ on 8051...126 millions were shipped in 1993..most POPULAR http://www.esacademy.com/automation/faq/8051/2.htm It turns out to be the most informative link on 8051...from Dallas, Atmel, philips, etc....however it disclaims everything :) there are a few smartcards out there with atmel cores; the funcards and jupiter cards have 8515's, 2313, 2343 in them. recognizing them gets a littlebit more difficult, and depends on whether the card contains a flash based processor or is a commercial design (i.e. built with a rom mask). all of the flash based (programmable) smartcards are really the same basic design as the production chips available, for example, the infamous goldcard is just a pic 16F84 and 24LC16 eeprom, with the important wires brought out to the smartcard contacts (MCLR,Vcc,Vss,RB6,RB7). these cards are programmable the same way that you would program the individual chips so if you want to see if a card is atmel based, the best way is to attempt to connect it to an atmel programmer and see if things like the basic configuration bits can be read... http://www.edaboard.com/ftopic74254.html smartcard emulator http://www.makinterface.de/index_e.php3?frompage=/emule.php3 smartcard products http://www.emmarin.com/Line.asp?IdLine=7 http://www.emmarin.com/webfiles/Product/Smartcard/EMTG96_DS.pdf This one HAS NO INTERNAL CRYPTO CO-PROCESSOR and still MCS51 compatible 96kB flash...Hence we can apply our AES module here :D Learn more about AVR, ARM, 80C51 http://www.atmel.com/seminar/Mcu/about.asp 80C51 :TCP/IP solution, smartcard reader, CAN network, MP3 controler, USB cont. smart card compatible with MCS-51 http://www.iccard.com.cn/scad/source_e.htm http://www.iccard.com.cn/scad/arch_e.htm architectural layer from aplication-API-to uC unit of smartcard http://www.hynix.com/eng/products/system_ic/sp/smart.jsp The Smart Card Alliance and other industry leaders working together for a safer future. http://www.atmel.com/ad/smartalliance/ White paper: http://www.atmel.com/ad/SMARTALLIANCE/documents/whitepaper.pdf Smart Times -- A tale of security http://www.gemplus.com/smart/enews/st4/tale.html S/W countermeasures, H/W countermeasures..h/w security issues it has giving me an insight to group countermeasure to s/w and h/w which in real are intertwined http://www.gemplus.com/smart/enews/st4/sidechannel.html Philips Semiconductors launches SmartMX, a versatile, highly secure 8051-based family of smart card microcontrollers http://www.semiconductors.philips.com/news/content/file_758.html A Better Use of Smart Cards in PKIs http://www.gemplus.com/smart/r_d/publications/pdf/FJ02pkis.pdf Software Smart Cards via Cryptographic Camouflage http://www.arcot.com/products/arcot_ieee.pdf why do it with CRYPTO Co-Processor and not the host processor Rania development tools provide Theseus uP card simulator and emulator...its too bad that we can't download it http://www.emosyn.atmi.com/dspPage.asp?pagid=29 Chipcard directory A-Z http://www.xs4all.nl/~ganswijk/chipdir/t/r.htm http://www.isg.rhul.ac.uk/~costasm/smartlinks.html http://www.techdirectory.ws/Hardware/Other/Smartcard_Readers/default.aspx (290504 09:45) "Whenever you have a secret, you have a vulnerability." there is no need to panic yet since the discussion around AES’s vulnerability is entirely theoretical. http://www.csoonline.com.au/index.php?id=652061604&fp=8&fpid=5 XLS attack on AES Rijndael...doubting the attack http://msgs.securepoint.com/cgi-bin/get/bugtraq0310/184/1/1.html Comments on the security of the AES and the XSL techninique..the above doubt http://citeseer.ist.psu.edu/rd/98588148%2C548008%2C1%2C0.25%2CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/26801/http:zSzzSzwww.cosic.esat.kuleuven.ac.bezSznessiezSzreportszSzphase2zSzXslbes8_Ness.pdf/comments-on-the-security.pdf FIPS 140-1 and FIPS 140-2 Vendor List....certified vendor http://csrc.nist.gov/cryptval/140-1/1401vend.htm Raisonance Embedded Systems Development Tools price list http://www.raisonance.com/buy/prices.php http://www.raisonance.com/files/pdf/SmartCardPriceEuro.PDF :card price list http://www.signum.com/Signum.htm?p=Raisonance.htm SmartCardICE.pdf Briefing Notes on Multi Application Smart Cards http://www.smartcard.co.uk/resources/software/toolkit.pdf 8051, the Motorola 6805 and the Hitachi H8..The method of personalising such cards (010604 15:30) Smart card distributors with datasheet.. MOST COMPLETE refering to the previous searchs http://www.dig-international.com/ Private Circuits: Securing Hardware against Probing Attacks - Yuval Ishai hardware countermeasures http://www.cs.berkeley.edu/~daw/papers/privcirc-crypto03.pdf (020604 08:29) MCU card faster than SAB 8051 Low end controller with 0.5kB EEPROM, 7.5kB ROM, 128 byte RAM http://www.digitech-smart-cards-brokers-memory-micro-chips-ics-rf-id-tags.com/pdf/infineon/SPI_SLE22C05S_1001.pdf MCU card faster than SAB 8051 Low end controller with 1kB EEPROM, 7kB ROM, 256 byte RAM http://www.digitech-smart-cards-brokers-memory-micro-chips-ics-rf-id-tags.com/pdf/infineon/spi_sle44c10s_07_99.pdf (020604 16:25) From the previous (080504 ) search: sidechannel.htm by J. A. Muir This thesis surveys the techniques of side channel cryptanalysis developed by Kocher [1996], Boneh, DeMillo and Lipton [1997], and Kocher, Jaffe and Jun [1999] http://www.math.uwaterloo.ca/~jamuir/papers/mmthesis-side-channel.pdf ITS A MATH MASTER THESIS (020604 20:24) List of Supported Chips (Keil device database) http://www.keil.com/dd/ Provides HOW TO guide for adding database http://www.keil.com/dd/whatisdd.htm adding a custom devices database/library http://www.keil.com/support/docs/1421.htm Keil: Infineon SAB80C517 Timer 2 Example Program http://www.keil.com/download/files/80c517_timer2.zip it requires this next header file: http://www.keil.com/dd/docs/c51/infineon/reg517a.h 10 Myths about cryptography It is a link from the page which published noise test over AES candidates (at 110504 ) this noise test is in security context. http://www.purenoise.com/html/myths.html http://www.purenoise.com/html/the_issue.html the issue: U.S. government regulation (030604 08:33) Papers on securing AES with masking countermeasure usually refer to Messerges paper Here are citation of Messerges http://www.informatik.uni-trier.de/~ley/db/indices/a-tree/m/Messerges:Thomas_S=.html but I forgot something we'll to pay for all (springer link & ieee) so it won't be for free However, this next messerges paper is for free (may be out of date): Investigations of Power Analysis Attacks on Smartcards (1999) http://citeseer.ist.psu.edu/rd/98588148%2C291585%2C1%2C0.25%2CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/14255/http:zSzzSzwww.eecs.uic.eduzSz%7EtmessergzSzusenix99zSzpaper_n.pdf/messerges99investigations.pdf The story of uC http://www.embedded.com/shared/printableArticle.jhtml;jsessionid=XKA0BQDFF3AIIQSNDBNSKHQ?articleID=9901205 (040604 20:07) define:porting http://www.google.com/search?hl=en&ie=ISO-8859-1&q=define%3Aporting (050604 09:53) ZIPed Rijndael proposal test vector (test vector other than the AESAVS) http://www.mirrors.wiretapped.net/security/cryptography/algorithms/rijndael/aes-testvalues/ http://www.mirrors.wiretapped.net/security/cryptography/algorithms/rijndael/aes-testvalues/zip/rijndael-vals.zip (060604 16:38) http://www.google.com/search?hl=en&lr=lang_en%7Clang_fr%7Clang_id&ie=ISO-8859-1&q=define%3ARAM&lr=lang_en%7Clang_fr%7Clang_id (060604 18:07) CRC16-CCITT This page presents accurate implementations (long-hand and programmed) of the 16-bit CRC-CCITT specification http://www.joegeluso.com/software/articles/ccitt.htm CRC: A Paper On CRCs This CRC web was created because of the popularity of a paper on CRC algorithms written by Ross Williams and posted to some Internet newsgroups on 19 August 1993. http://www.ross.net/crc/crcpaper.html List of ieee keywords http://www.ieee.org/organizations/pubs/ani_prod/keywrd98.txt saved to ieee List of CMVP lab NATIONAL VOLUNTARY LABORATORY ACCREDITATION PROGRAM CRYPTOGRAPHIC MODULES TESTING http://csrc.nist.gov/cryptval/1401labs.htm http://csrc.nist.gov/cryptval/labinfo.htm estimated fees for CMT LAP ...- $10,380: for Admin/Tech.... WOW expensives validation costs! (070604 13:03) Keil supperted chip: Philips WE Family (smartcard) The Philips WE Family is a smart card IC family with security and crypto controller for a wide range of applications such as security-sensitive applications such as banking, SIM cards for mobile phones, pay TV, and security access modules (SAM) for POS-terminals. http://www.keil.com/dd/chip/3554.htm The vendor sites: http://www.semiconductors.philips.com/markets/identification/products/we/ Security and Chip Card ICs:Infineon http://www.holz-elektronik.de/pics/holz/downloads/cipcard_linecard.pdf http://www.infineon.com http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod_cat.jsp?oid=-9519 Infineon:Eurochip 77 -- SLE 7736 http://www.infineon.com/cgi/ecrm.dll/ecrm/scripts/prod_ov.jsp?oid=32266&cat_oid=-9519 FIPS 46-3, Data Encryption Standard (DES), specifies the DES and Triple-DES algorithms. For the complete specification of Triple-DES, the standard ANSI X9.52-1998, Triple Data Encryption Algorithm Modes of Operation, must be used in conjunction with FIPS 46-3. Copies of X9.52-1998 may be obtained from X9, a standards committee for the financial services industry. NIST does NOT have copies of the standard available for distribution. http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf (100604 07:13) The above timing_attack.pdf cited this paper.. another of Kocher's http://citeseer.ist.psu.edu/rd/98588148%2C266537%2C1%2C0.25%2CDownload/http%3AqSqqSqwww.cryptography.comqSqdpaqSq..qSqtimingattackqSqtiming.pdf Previously Kocher did a warning through his extended abstract: (7 December 1995) Since many existing security systems can be broken with timing attacks, I am releasing this preliminary abstract to alert vendors and users. Research in this area is still in progress.... http://citeseer.ist.psu.edu/rd/98588148%2C220950%2C1%2C0.25%2CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/3255/ftp:zSzzSzftp.cert.dfn.dezSzpubzSzdocszSzcryptzSzkocher_timing_attack.pdf/kocher95cryptanalysis.pdf