Is using a developer key to protect a REST API good practice?

I’d like to implement a RESTful API service over HTTP that developers can call from their server side environments.
I intend to use a cryptographically secure pseudo-random number generator (CSPRNG) to generate keys and then convert the bi… Continue reading Is using a developer key to protect a REST API good practice?

Should I be concerned about timing attacks on HTTP service for passwordless signin?

I have an service that accepts an HTTP POST request from the end-user’s browser. The user passes their only email. I intend the server to generate a token and store this in a database, and email them the HMAC’d token as a means of implemen… Continue reading Should I be concerned about timing attacks on HTTP service for passwordless signin?

Should I be concerned about timing attacks on HTTP service for passwordless signin?

I have an service that accepts an HTTP POST request from the end-user’s browser. The user passes their only email. I intend the server to generate a token and store this in a database, and email them the HMAC’d token as a means of implemen… Continue reading Should I be concerned about timing attacks on HTTP service for passwordless signin?

In the time side channel, is there any way to improve the measurement time accuracy?

I want to measure the execution time of a function. The execution time of this function is only slightly different in the two cases. Is there any way I can accurately measure its time to distinguish the two cases?
The possible solutions ar… Continue reading In the time side channel, is there any way to improve the measurement time accuracy?

What mitigations are there against a timing attack done to find which devices are communicating on a set of devices?

I know the title isn’t good at all but allow me to explain. In this model I have n devices on different networks that are able to communicate with each other. A supervisor is able to see every packet a device sends or receives. How can two… Continue reading What mitigations are there against a timing attack done to find which devices are communicating on a set of devices?