!!! Overview [{$pagename}] is any [attack] based on information gained from the physical [implementation] of a cryptosystem, rather than [Brute-Force] or [Cryptographically Weakness|Cryptographically Weak] in the [algorithms]. For [example], timing information, [Energy] consumption, electromagnetic [Data Leakage] or even [audio] can provide an extra source of information, which can be [exploited|Exploit] to break the system. [{$pagename}], being based on physical implementation, may be effective on [Information-theoretic Secure] [cryptographic Primitives] or [algorithms]. Some [{$pagename}] require technical knowledge of the internal operation of the system, either the [Operating System] or even the [hardware], on which the [cryptography] is implemented, although others such as differential power analysis are effective as black-box attacks. Many powerful [{$pagename}] are based on statistical methods pioneered by Paul Kocher. Attempts to break a [Cryptographic] system by deceiving or coercing people with legitimate access are typically considered [Social Engineering Attack]. [{$pagename}] are generally considered to require High [Attack Effort] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Side-channel_attack|Wikipedia:Side-channel_attack|target='_blank'] - based on information obtained 2017-06-28-