Overview#
Side-channel attacks is any attack based on information gained from the physical implementation of a cryptosystem, rather than Brute-Force or Cryptographically Weakness in the algorithms.For example, timing information, Energy consumption, electromagnetic Data Leakage or even audio can provide an extra source of information, which can be exploited to break the system.
Side-channel attacks, being based on physical implementation, may be effective on Information-theoretic Secure cryptographic Primitives or algorithms.
Some Side-channel attacks require technical knowledge of the internal operation of the system, either the Operating System or even the hardware, on which the cryptography is implemented, although others such as differential power analysis are effective as black-box attacks.
Many powerful Side-channel attacks are based on statistical methods pioneered by Paul Kocher.
Attempts to break a Cryptographic system by deceiving or coercing people with legitimate access are typically considered Social Engineering Attack.
Side-channel attacks are generally considered to require High Attack Effort
More Information#
There might be more information for this subject on one of the following:- Attack
- Computational Hardness Assumption
- Cryptanalysis
- FLUSH+RELOAD
- Information-theoretic Secure
- Privacy Considerations Distributed Ledger Technology
- Web Blog_blogentry_270717_1
- Web Blog_blogentry_280617_1
- [#1] - Side-channel_attack
- based on information obtained 2017-06-28-