Industry Expert Blogs
Protecting electronic systems from side-channel attacksRambus BlogDec. 21, 2017 |
During the early days of safecracking, rudimentary rotary locks were compromised by feel or sound to determine the correct combination. Following in this tradition, cyber criminals and other malicious actors are now exploiting side-channel attacks (SCA) to compromise cryptographic systems.
To be sure, all physical electronic systems routinely leak information about the internal process of computing via fluctuating levels of power consumption and electro-magnetic emissions. Much like traditional safecracking, electronic side-channel attacks eschew a brute force approach to extracting keys and other secret information from a device or system.
Related Blogs
- Mitigating Side-Channel Attacks In Post Quantum Cryptography (PQC) With Secure-IC Solutions
- Thales e-Security's Countermeasure Validation Certification
- What's Behind The Power Savings
- QuiddiKey: A Single Cryptographic Solution for the Lifecycle of a Connected Device
- Secure-IC is ready for ASIL B or ASIL D levels projects with its Securyzr integrated Secure Element