
Originally Posted by
Matt Mahoney
OK I understand about timing attacks. If an attacker with non-root access to a shared server can monitor events like cache timing while your compression algorithm is running, he can guess some plaintext even if he does not have read permission on the input or output. There are similar attacks on AES, so far only theoretical, but it was enough for Intel to consider AES instructions that would resist such attacks.
Well, I'm not sure it is possible to prevent such attacks, or that it is something we should even try to prevent.