ORSHIN Attack Defense Framework

Correlation between power consumption and key material in an unprotected cryptographic implementation leads to key extraction

Description

Correlation between power consumption and key material in an unprotected cryptographic implementation leads to key extraction

CWE

CVE

Attack Surfaces

Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)

Attack Vectors

SCA

Power Side-Channel (MITRE EMB3D TID-101)

Defenses

Decouple the power consumption from the key, Data randomization, Masking, Blinding

Decrease signal-to-noise ratio, Instruction shuffling, Dummy instructions, Clock jitter, Increase parallel activity