Correlation between electromagnetic emanations and key material in an unprotected cryptographic implementation leads to key extraction
Description
Correlation between electromagnetic emanations and key material in an unprotected cryptographic implementation leads to key extractionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
SCA
Electromagnetic Side-Channel (MITRE EMB3D TID-102)
Defenses
Decouple the electromagnetic emanations from the key, Data randomization, Masking, Blinding
Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity