If a burglar wants to break into your house, he does not necessarily have to break the lock and come inside. He may break in through the window or break the hinges of the door and break-in. Attackers use a similar concept to break a cryptosystem through the side-channel attack.
What is the side-channel attack?
In practice, a cryptosystem is implemented on physical devices. It is very difficult to break the cryptographic algorithm. But, usually, during cryptographic computation, the physical devices reveal some information in terms of power consumption, heat dissipation, time of computation, electromagnetic leaks, etc. This information is called side-channel information. In the side-channel attack, an attacker uses this side-channel Information to determine the secret keys and break the cryptosystem.
Different Types Of The Side-Channel Attack
There are different types of side-channel attacks that are based on different side-channel information. Some most common ones are mentioned below:
0 Comments