aboutsummaryrefslogtreecommitdiffstats
path: root/doc/manual/side_channels.rst
diff options
context:
space:
mode:
authorJack Lloyd <[email protected]>2018-06-22 15:04:05 -0400
committerJack Lloyd <[email protected]>2018-06-22 15:04:05 -0400
commitad9554ded323741f72d9e8a0ae527603940e0252 (patch)
tree0a419fcb345fa94b6e061650b8577868272badf6 /doc/manual/side_channels.rst
parentb25ebe068f23b1b4b13f36d7f1fdfb7f4ff9bcae (diff)
Fix typo [ci skip]
Diffstat (limited to 'doc/manual/side_channels.rst')
-rw-r--r--doc/manual/side_channels.rst2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/manual/side_channels.rst b/doc/manual/side_channels.rst
index 763365f8f..54be346b5 100644
--- a/doc/manual/side_channels.rst
+++ b/doc/manual/side_channels.rst
@@ -250,7 +250,7 @@ On all other processors, a table lookup version (T-tables) is used. This
approach is relatively fast, but known to be very vulnerable to side
channels. To reduce the side channel signature, AES uses only 1K of tables
(instead of 4 1K tables which is typical). The tables are computed at runtime
-whcih prevents an attacker from performing a Flush+Reload attack since the
+which prevents an attacker from performing a Flush+Reload attack since the
address of the tables is not fixed. Before each encryption/decryption operation,
a value from each cache line of the T-table is read to compute a volatile
value Z. This Z value is computed in such a way that it is always zero. Since