Skip to content

Instantly share code, notes, and snippets.

Created December 1, 2013 01:44
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save chiiph/7727602 to your computer and use it in GitHub Desktop.
Save chiiph/7727602 to your computer and use it in GitHub Desktop.
Proof of concept wanna be for Python's timing leaks
import os
import time
import gc
def const_cmp(str1, str2):
res = len(str1) ^ len(str2)
for a, b in zip(str1, str2):
res |= ord(a) ^ ord(b)
return res == 0
expected_password = "thisneedstobe32bytesdoyougrokit?" #os.urandom(32)
def oracle(password):
return password == expected_password
def oracle_const(password):
return const_cmp(password, expected_password)
def get_average_time(guessed, c):
time_arr = []
for i in range(100000):
test_password = guessed + c + "A"*(32-1-len(guessed))
assert len(test_password) == 32
start = time.time()
end = time.time()
curt = end-start
return sum(time_arr) / float(len(time_arr))
def attack():
guessed = ""
for i in range(32):
candidate = None
candidate_time = 0.0
for b in range(256):
current_time = get_average_time(guessed, chr(b))
if chr(b) == expected_password[i]:
# Just a check to see what we should've seen
print(current_time, chr(b))
if candidate_time < current_time:
print(candidate_time, current_time, repr(chr(b)))
candidate = b
candidate_time = current_time
guessed += chr(candidate)
print("Attack result:", oracle(guessed))
if __name__ == "__main__":
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment