Fact: Constant Time Programming Language

This page summarizes the projects mentioned and recommended in the original post on news.ycombinator.com

InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
  • FaCT

    Flexible and Constant Time Programming Language

  • While it would be nice, this is somewhat mitigated by the fact that they've got a top-level directory called "example."

    https://github.com/PLSysSec/FaCT/blob/master/example/example...

  • movfuscator

    The single instruction C compiler

  • Slightly offtopic sorry, but I remember seeing this project years ago for a compiler that emits only mov instructions:

    https://github.com/xoreaxeaxeax/movfuscator

    Since this is effectively branchless and every instruction would take the same number of micro ops, wouldn't this be a very safe way of writing side secure cryptographic code free of side channels?

  • InfluxDB

    Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.

    InfluxDB logo
  • subtle

    Pure-Rust traits and utilities for constant-time cryptographic implementations.

  • Rust has some great constant time libs already, for instance `subtle` [0]. A `derive(ConstantTimeEq)` might get you most of the way, but a constant-timeifier would be great for wrapping whole algos where you might not want to think too hard about timing side channels.

    For your sleeping proposal, it sounds a little like differential privacy [1] where you can add some randomness to gain some privacy but using up your privacy budget in the process. In that case, `N` depends on the sensitivity of the data, the noise amount, and your privacy budget. If you get it right, it has provable security properties. However, that works better when the adversary does not have physical access to the machine and can't observe the intermediate state (or side channel leaks thereof).

    [0]: https://github.com/dalek-cryptography/subtle

    [1]: https://github.com/dalek-cryptography/subtle

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a more popular project.

Suggest a related project

Related posts