Side-channel attacks conducted against electronic gear are relatively simple and inexpensive to execute. Such attacks include simple power analysis (SPA) and Differential Power Analysis (DPA). An attacker does not need to know specific implementation details of the cryptographic device to perform these attacks and extract keys. As all physical electronic systems routinely leak information, effective side-channel countermeasures should be implemented at the design stage to ensure protection of sensitive keys and data.
Download this white paper to:
- Learn about what side-channel attacks are
- Learn about how SPA and DPA work
- Understand what can be done to evaluate side-channel vulnerability
Get the white paper by completing the form.