!!! Overview
[{$pagename}] is any [attack] based on information gained from the physical [implementation] of a cryptosystem, rather than [Brute-Force] or [Cryptographically Weakness|Cryptographically Weak] in the [algorithms]. For [example], timing information, [Energy] consumption, electromagnetic [Data Leakage] or even [audio] can provide an extra source of information, which can be [exploited|Exploit] to break the system. 

[{$pagename}], being based on physical implementation, may be effective on [Information-theoretic Secure] [cryptographic Primitives] or [algorithms]. 

Some [{$pagename}] require technical knowledge of the internal operation of the system, either the [Operating System] or even the [hardware], on which the [cryptography] is implemented, although others such as differential power analysis are effective as black-box attacks. 

Many powerful [{$pagename}] are based on statistical methods pioneered by Paul Kocher.

Attempts to break a [Cryptographic] system by deceiving or coercing people with legitimate access are typically considered [Social Engineering Attack].

[{$pagename}] are generally considered to require High [Attack Effort]

!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]
----
* [#1] - [Side-channel_attack|Wikipedia:Side-channel_attack|target='_blank'] - based on information obtained 2017-06-28-