What is a side channel attack? How these end-runs around encryption put everyone at risk

What is a side channel attack? How these end-runs around encryption put everyone at risk

Source: CSO Magazine On:

Read On

Side channel attack description

So , you want to {crack|split} cryptography.

Brute {pressure|push|power|drive} attacks on cryptography could {get|consider} billions of years, which no one needs to spare. Maybe you live in a nation where rubber {line|hose pipe} cryptography is, will we say, frowned upon. Hacking a target’s endpoint is an choice, but what if you get caught? Preferable to use an attack that leaves simply no forensic traces behind.

Enter side channel attacks. The side channel attack breaks cryptography by using information leaked by cryptography, such as monitoring the electromagnetic industry (EMF) radiation emitted by a monitor to view information before it’s encrypted in a van Eck phreaking {assault|strike}, aka Transient Electromagnetic Pulse Emanation STandard (TEMPEST). Other well-known {part|aspect} channel attacks include spying {around the|within the|for the|in the|over the} power consumption of an electronic device in order to steal an encryption key, or even acoustic attacks that record requirements of an user’s key strokes in order to steal their passphrase.

These side channel attacks {are certainly not|aren’t} theoretical and have been known regarding for decades. The oldest, and most typical, and used by intelligence agencies plus police around the world, is the park your own van across the street from the victim plus spy on their computer screens utilizing a TEMPEST attack.

About the author: CIO Minute
Tell us something about yourself.
Do NOT follow this link or you will be banned from the site!
ZHL QLKplHtvTPoe