Glossary:Side channel attack: Difference between revisions
(Created page with "A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, observing how the power consumed by a processor while encrypting data can leak informaion, ultimately leading to discovery of the encryption key.") Â |
No edit summary  |
||
Line 1: | Line 1: | ||
A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data to draw inferences about the data itself. For example, unless carefully designed, | A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data in order to draw inferences about the data itself. For example, unless carefully designed, variations in the power consumed by a processor while encrypting data can leak information about the data, perhaps ultimately leading to discovery of the encryption key. However, the rate of data leakage is usually very low, and insignificant in all but the most secure environments. |
Latest revision as of 15:38, 23 September 2024
A side channel or covert channel attack is one which exploits some side-effect of the processing, transmission or storage of data in order to draw inferences about the data itself. For example, unless carefully designed, variations in the power consumed by a processor while encrypting data can leak information about the data, perhaps ultimately leading to discovery of the encryption key. However, the rate of data leakage is usually very low, and insignificant in all but the most secure environments.