Correlation between power consumption and key material in an unprotected cryptographic implementation leads to key extraction
Description
Correlation between power consumption and key material in an unprotected cryptographic implementation leads to key extractionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
Attack Vectors
SCA
Power Side-Channel (MITRE EMB3D TID-101)
Defenses
Decouple the power consumption from the key, Data randomization, Masking, Blinding
Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity