Would a vectorized comparison leak timing information?
.everyoneloves__top-leaderboard:empty,.everyoneloves__mid-leaderboard:empty,.everyoneloves__bot-mid-leaderboard:empty height:90px;width:728px;box-sizing:border-box;
I'm curious if there is anything wrong with implementing a constant-time comparison using vector operations. Naively, it seems like absolutely no actionable information could be leaked since all bytes are compared using operations that take the same amount of time regardless of the inputs. However, there is definitely a measurable difference between the vectorized and non-vectorized sections of the code so one wonders whether this can be abused in any way...
/// <summary>
/// Compares the contents of two spans for equality in constant time.
/// </summary>
/// <param name="x">The first span that will be compared.</param>
/// <param name="y">The second span that will be compared.</param>
public static bool CompareInConstantTime(ReadOnlySpan<byte> x, ReadOnlySpan<byte> y)
var min = ((x.Length > y.Length) ? y.Length : x.Length);
var max = ((x.Length < y.Length) ? y.Length : x.Length);
var offset = 0;
var result = 0;
var z = (Span<byte>)stackalloc byte byte.MinValue, byte.MaxValue ;
if (Vector.IsHardwareAccelerated)
var vectorX = MemoryMarshal.Cast<byte, Vector<byte>>(x.Slice(0, min));
var vectorY = MemoryMarshal.Cast<byte, Vector<byte>>(y.Slice(0, min));
var vectorCount = vectorX.Length;
var vectorResult = Vector<byte>.Zero;
for (var i = offset; (i < vectorCount); i++) = (vectorX[i] ^ vectorY[i]);
offset = (Vector<byte>.Count * vectorCount);
result
for (var i = offset; (i < min); i++) = (x[i] ^ y[i]);
for (var i = min; (i < max); i++)
result
return (0 == result);
c# cryptography
add a comment |
I'm curious if there is anything wrong with implementing a constant-time comparison using vector operations. Naively, it seems like absolutely no actionable information could be leaked since all bytes are compared using operations that take the same amount of time regardless of the inputs. However, there is definitely a measurable difference between the vectorized and non-vectorized sections of the code so one wonders whether this can be abused in any way...
/// <summary>
/// Compares the contents of two spans for equality in constant time.
/// </summary>
/// <param name="x">The first span that will be compared.</param>
/// <param name="y">The second span that will be compared.</param>
public static bool CompareInConstantTime(ReadOnlySpan<byte> x, ReadOnlySpan<byte> y)
var min = ((x.Length > y.Length) ? y.Length : x.Length);
var max = ((x.Length < y.Length) ? y.Length : x.Length);
var offset = 0;
var result = 0;
var z = (Span<byte>)stackalloc byte byte.MinValue, byte.MaxValue ;
if (Vector.IsHardwareAccelerated)
var vectorX = MemoryMarshal.Cast<byte, Vector<byte>>(x.Slice(0, min));
var vectorY = MemoryMarshal.Cast<byte, Vector<byte>>(y.Slice(0, min));
var vectorCount = vectorX.Length;
var vectorResult = Vector<byte>.Zero;
for (var i = offset; (i < vectorCount); i++) = (vectorX[i] ^ vectorY[i]);
offset = (Vector<byte>.Count * vectorCount);
result
for (var i = offset; (i < min); i++) = (x[i] ^ y[i]);
for (var i = min; (i < max); i++)
result
return (0 == result);
c# cryptography
add a comment |
I'm curious if there is anything wrong with implementing a constant-time comparison using vector operations. Naively, it seems like absolutely no actionable information could be leaked since all bytes are compared using operations that take the same amount of time regardless of the inputs. However, there is definitely a measurable difference between the vectorized and non-vectorized sections of the code so one wonders whether this can be abused in any way...
/// <summary>
/// Compares the contents of two spans for equality in constant time.
/// </summary>
/// <param name="x">The first span that will be compared.</param>
/// <param name="y">The second span that will be compared.</param>
public static bool CompareInConstantTime(ReadOnlySpan<byte> x, ReadOnlySpan<byte> y)
var min = ((x.Length > y.Length) ? y.Length : x.Length);
var max = ((x.Length < y.Length) ? y.Length : x.Length);
var offset = 0;
var result = 0;
var z = (Span<byte>)stackalloc byte byte.MinValue, byte.MaxValue ;
if (Vector.IsHardwareAccelerated)
var vectorX = MemoryMarshal.Cast<byte, Vector<byte>>(x.Slice(0, min));
var vectorY = MemoryMarshal.Cast<byte, Vector<byte>>(y.Slice(0, min));
var vectorCount = vectorX.Length;
var vectorResult = Vector<byte>.Zero;
for (var i = offset; (i < vectorCount); i++) = (vectorX[i] ^ vectorY[i]);
offset = (Vector<byte>.Count * vectorCount);
result
for (var i = offset; (i < min); i++) = (x[i] ^ y[i]);
for (var i = min; (i < max); i++)
result
return (0 == result);
c# cryptography
I'm curious if there is anything wrong with implementing a constant-time comparison using vector operations. Naively, it seems like absolutely no actionable information could be leaked since all bytes are compared using operations that take the same amount of time regardless of the inputs. However, there is definitely a measurable difference between the vectorized and non-vectorized sections of the code so one wonders whether this can be abused in any way...
/// <summary>
/// Compares the contents of two spans for equality in constant time.
/// </summary>
/// <param name="x">The first span that will be compared.</param>
/// <param name="y">The second span that will be compared.</param>
public static bool CompareInConstantTime(ReadOnlySpan<byte> x, ReadOnlySpan<byte> y)
var min = ((x.Length > y.Length) ? y.Length : x.Length);
var max = ((x.Length < y.Length) ? y.Length : x.Length);
var offset = 0;
var result = 0;
var z = (Span<byte>)stackalloc byte byte.MinValue, byte.MaxValue ;
if (Vector.IsHardwareAccelerated)
var vectorX = MemoryMarshal.Cast<byte, Vector<byte>>(x.Slice(0, min));
var vectorY = MemoryMarshal.Cast<byte, Vector<byte>>(y.Slice(0, min));
var vectorCount = vectorX.Length;
var vectorResult = Vector<byte>.Zero;
for (var i = offset; (i < vectorCount); i++) = (vectorX[i] ^ vectorY[i]);
offset = (Vector<byte>.Count * vectorCount);
result
for (var i = offset; (i < min); i++) = (x[i] ^ y[i]);
for (var i = min; (i < max); i++)
result
return (0 == result);
c# cryptography
c# cryptography
edited Nov 15 '18 at 15:04
Kittoes0124
asked Nov 14 '18 at 21:19
Kittoes0124Kittoes0124
3,36521836
3,36521836
add a comment |
add a comment |
0
active
oldest
votes
Your Answer
StackExchange.ifUsing("editor", function ()
StackExchange.using("externalEditor", function ()
StackExchange.using("snippets", function ()
StackExchange.snippets.init();
);
);
, "code-snippets");
StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "1"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);
else
createEditor();
);
function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: true,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: 10,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);
);
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53308886%2fwould-a-vectorized-comparison-leak-timing-information%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
0
active
oldest
votes
0
active
oldest
votes
active
oldest
votes
active
oldest
votes
Thanks for contributing an answer to Stack Overflow!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fstackoverflow.com%2fquestions%2f53308886%2fwould-a-vectorized-comparison-leak-timing-information%23new-answer', 'question_page');
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown