Food for Thought

I’ve taken you on a long ride, but I hope it was worth it. As usual, I will leave you several possibly quite interesting problems to consider:

  • First, although I have focused on the impact that computational complexity attacks have on cryptography-related application, the problem is not strictly limited to this area, and often manifests itself whenever private or confidential information is processed. Certainly, various basic information about HTTP requests or SMTP traffic can be deduced by carefully observing the appropriate service on a system; can you think of any more practical scenarios?

  • Second, even if no secret data is being processed by a service, computational complexity information may be of some use. Consider applications ...

Get Silence on the Wire now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.