Protecting electronic systems from side-channel attacks
During the early days of safecracking, rudimentary rotary locks were compromised by feel or sound to determine the correct combination. Following in this tradition, cyber criminals and other malicious actors are now exploiting side-channel attacks (SCA) to compromise cryptographic systems.
To be sure, all physical electronic systems routinely leak information about the internal process of computing via fluctuating levels of power consumption and electro-magnetic emissions. Much like traditional safecracking, electronic side-channel attacks eschew a brute force approach to extracting keys and other secret information from a device or system.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- How to Secure IoT Edge Device from Multiple Attacks?
- An introduction to side-channel attacks
- Side-Channel Attacks Target Machine Learning (ML) Models
- Side-channel attacks explained: everything you need to know