Second order correlation between power consumption and key material in a first-order protected cryptographic implementation leads to key extraction
Description
Second order correlation between power consumption and key material in a first-order protected cryptographic implementation leads to key extractionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
SCA
Power Side-Channel (MITRE EMB3D TID-101)
Defenses
Decouple the power consumption from the key, Second order masking
Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity