Embed presentation
Downloaded 88 times












Side-channel attacks exploit physical implementations of cryptosystems to gain information without using brute force or known vulnerabilities. Common side-channel attacks include timing attacks, power analysis, electromagnetic analysis, acoustic analysis, and fault injection. Examples include using timing information to deduce private keys from OpenSSL and Apache servers, recovering passwords from keyboard sounds, and extracting encryption keys from electromagnetic emissions or by freezing RAM. Defenses depend on the system and attack but imagination limits hackers' techniques.










