ITWissen.info - Tech know how online

side channel attack (SCA)

In the side channelattack, the attack on the secret data of

a mobile device or a security module is not carried out directly, but via secondary information that arises during use. Starting points for attacking secret data in security-related devices and components are the processing time required by the processor

toprocess a digital signature, power consumption and electromagnetic radiation

.All these and other values are extracted and used to calculate algorithms that can crack the cryptosystem of a mobile device, smart cards, security modules or security tokens

.

To counter the threat of such attacks, it is important in the application of cryptographic techniques to consider not only the security

at thelevel of algorithms, but also the way in which the cryptographic technique is implemented

. In vulnerability analysis, side-channel analysis is also used to satisfy the Common Criterias (CC).

Informationen zum Artikel
Englisch: side channel attack - SCA
Updated at: 28.01.2020
#Words: 197
Links: