Key-dependent exponentiation leads to single-trace key extraction through measuring power consumption
Description
Key-dependent exponentiation leads to single-trace key extraction through measuring power consumptionCWE
CVE
Attack Surfaces
Cryptographic Algorithm Implementation (MITRE EMB3D PID-11)
RSA Exponentiation (MITRE EMB3D PID-11)
RSA Exponentiation (MITRE EMB3D PID-11)
Private Key (MITRE EMB3D PID-12)
Attack Vectors
SCA
Power Side-Channel (MITRE EMB3D TID-101)
Defenses
Constant-time/flow implementation, Square and multiply always, Montgomery ladder