CyberGlossary

Vulnerabilities

Timing Attack

Also known as: Timing side-channel

Definition

A side-channel attack that recovers secret information by measuring how long an operation takes under different inputs.

Timing attacks exploit input-dependent execution time in cryptographic and authentication code. Classic targets are non-constant-time string comparisons (each early-mismatch byte short-circuits and reveals progress), modular exponentiation (square-and-multiply leaking key bits), AES table lookups, and database lookups whose duration depends on row existence. Even small differences — nanoseconds across a network, or microseconds locally — can be amplified by averaging many measurements. Defences require constant-time implementations (HMAC-style comparisons, branch-free conditional moves), library primitives like crypto_constant_time_eq, careful audit of cryptographic libraries, and rate-limiting or jitter at the boundary where attackers can measure.

Examples

  • Kocher's 1996 attack against RSA blinding via timing analysis.
  • Lucky Thirteen (CVE-2013-0169) — TLS CBC padding timing attack.

Related terms