Key-dependent exponentiation leads to single-trace key extraction through measuring electromagnetic emanations
Description
Key-dependent exponentiation leads to single-trace key extraction through measuring electromagnetic emanationsCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
RSA Exponentiation (MITRE EMB3D PID-11)
RSA Exponentiation (MITRE EMB3D PID-11)
Private Key (MITRE EMB3D PID-12)
Attack Vectors
SCA
Electromagnetic Side-Channel (MITRE EMB3D TID-102)
Defenses
Constant-time/flow implementation, Square and multiply always, Montgomery ladder
Add security sensors, EM proximity sensor