A security risk of depending on synchron
β
Gong, Li
π
Article
π
1992
π
Association for Computing Machinery
π
English
β 405 KB
Many algorithms or protocols, in particular cryptographic protocols such as authentication protocols, use synchronized clocks and depend on them for correctness. This note describes a scenario where a clock synchronization failure renders a protocol vulnerable to an attack even __after__ the faulty