ORSHIN Attack Defense Framework

Nth order correlation between electromagnetic emanations and key material in an (n-1)-order protected cryptographic implementation leads to key extraction

Description

Nth order correlation between electromagnetic emanations and key material in an (n-1)-order protected cryptographic implementation leads to key extraction

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

SCA

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Defenses

Decouple the electromagnetic emanations from the key, nth-order masking

Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity