jspωiki
Side-channel attacks

Overview#

Side-channel attacks is any attack based on information gained from the physical implementation of a cryptosystem, rather than Brute-Force or Cryptographically Weakness in the algorithms.

For example, timing information, Energy consumption, electromagnetic Data Leakage or even audio can provide an extra source of information, which can be exploited to break the system.

Side-channel attacks, being based on physical implementation, may be effective on Information-theoretic Secure cryptographic Primitives or algorithms.

Some Side-channel attacks require technical knowledge of the internal operation of the system, either the Operating System or even the hardware, on which the cryptography is implemented, although others such as differential power analysis are effective as black-box attacks.

Many powerful Side-channel attacks are based on statistical methods pioneered by Paul Kocher.

Attempts to break a Cryptographic system by deceiving or coercing people with legitimate access are typically considered Social Engineering Attack.

Side-channel attacks are generally considered to require High Attack Effort

More Information#

There might be more information for this subject on one of the following: