First page Back Continue Last page Summary Graphic
16. Use time as a Covert Channel
- Observe the time taken to do encryption using peoples' private keys
- Analyze the time differentials for different things encrypted to derive the private key bits. 
Notes: