ORSHIN Attack Defense Framework

Key-dependent exponentiation leads to single-trace key extraction through measuring electromagnetic emanations

Description

Key-dependent exponentiation leads to single-trace key extraction through measuring electromagnetic emanations

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

RSA (MITRE EMB3D PID-11)

RSA Exponentiation (MITRE EMB3D PID-11)

RSA Exponentiation (MITRE EMB3D PID-11)

Private Key (MITRE EMB3D PID-12)

Attack Vectors

SCA

Electromagnetic Side-Channel (MITRE EMB3D TID-102)

Defenses

Constant-time/flow implementation, Square and multiply always, Montgomery ladder

Add security sensors, EM proximity sensor