This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 18 lines
!!! Overview
[{$pagename}] is any [attack] based on information gained from the physical [implementation] of a cryptosystem, rather than [Brute-Force] or [Cryptographically Weakness|Cryptographically Weak] in the [algorithms]. For [example], timing information, [Energy] consumption, electromagnetic [Data Leakage] or even [audio] can provide an extra source of information, which can be [exploited|Exploit] to break the system.
[{$pagename}], being based on physical implementation, may be effective on [Information-theoretic Secure] [cryptographic Primitives] or [algorithms].
Some [{$pagename}] require technical knowledge of the internal operation of the system, either the [Operating System] or even the [hardware], on which the [cryptography] is implemented, although others such as differential power analysis are effective as black-box attacks.
Many powerful [{$pagename}] are based on statistical methods pioneered by Paul Kocher.
Attempts to break a [Cryptographic] system by deceiving or coercing people with legitimate access are typically considered [Social Engineering Attack].
[{$pagename}] are generally considered to require High [Attack Effort]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Side-channel_attack|Wikipedia:Side-channel_attack|target='_blank'] - based on information obtained 2017-06-28-