diff options
author | Jack Lloyd <[email protected]> | 2018-06-22 15:04:05 -0400 |
---|---|---|
committer | Jack Lloyd <[email protected]> | 2018-06-22 15:04:05 -0400 |
commit | ad9554ded323741f72d9e8a0ae527603940e0252 (patch) | |
tree | 0a419fcb345fa94b6e061650b8577868272badf6 /doc/manual/side_channels.rst | |
parent | b25ebe068f23b1b4b13f36d7f1fdfb7f4ff9bcae (diff) |
Fix typo [ci skip]
Diffstat (limited to 'doc/manual/side_channels.rst')
-rw-r--r-- | doc/manual/side_channels.rst | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/manual/side_channels.rst b/doc/manual/side_channels.rst index 763365f8f..54be346b5 100644 --- a/doc/manual/side_channels.rst +++ b/doc/manual/side_channels.rst @@ -250,7 +250,7 @@ On all other processors, a table lookup version (T-tables) is used. This approach is relatively fast, but known to be very vulnerable to side channels. To reduce the side channel signature, AES uses only 1K of tables (instead of 4 1K tables which is typical). The tables are computed at runtime -whcih prevents an attacker from performing a Flush+Reload attack since the +which prevents an attacker from performing a Flush+Reload attack since the address of the tables is not fixed. Before each encryption/decryption operation, a value from each cache line of the T-table is read to compute a volatile value Z. This Z value is computed in such a way that it is always zero. Since |