In the side channelattack, the attack on the secret data of
a mobile device or a security module is not carried out directly, but via secondary information that arises during use. Starting points for attacking secret data in security-related devices and components are the processing time required by the processor
toprocess a digital signature, power consumption and electromagnetic radiation
.All these and other values are extracted and used to calculate algorithms that can crack the cryptosystem of a mobile device, smart cards, security modules or security tokens
To counter the threat of such attacks, it is important in the application of cryptographic techniques to consider not only the security
at thelevel of algorithms, but also the way in which the cryptographic technique is implemented
. In vulnerability analysis, side-channel analysis is also used to satisfy the Common Criterias (CC).