ORSHIN Attack Defense Framework

Correlation between electromagnetic emanations and key material in an unprotected cryptographic implementation leads to key extraction

Description

Correlation between electromagnetic emanations and key material in an unprotected cryptographic implementation leads to key extraction

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

SCA

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Defenses

Decouple the electromagnetic emanations from the key, Data randomization, Masking, Blinding

Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity