Loading...
Please wait, while we are loading the content...
Similar Documents
Side-Channel Attacks
| Content Provider | Scilit |
|---|---|
| Author | Brooks, Richard R. |
| Copyright Year | 2013 |
| Description | The theoretical security of encryption algorithms, ensured by complexity arguments, is rarely beaten. Most encryption systems are defeated by social engineering, implementation flaws, or side-channel attacks [152]. Side-channel attacks take advantage of the fact that computers are physical objects. Even when it can be proved that the only way to derive the input and/or key of a cryptographic algorithm from the observed program output, that does not mean that the information is secure. The act of computation may have measurable physical consequences that can be measured and used to infer the key and/or data input. Book Name: Introduction to Computer and Network Security |
| Related Links | https://content.taylorfrancis.com/books/download?dac=C2010-0-44733-4&isbn=9780429089831&doi=10.1201/b14801-20&format=pdf |
| Ending Page | 262 |
| Page Count | 8 |
| Starting Page | 255 |
| DOI | 10.1201/b14801-20 |
| Language | English |
| Publisher | Informa UK Limited |
| Publisher Date | 2013-08-19 |
| Access Restriction | Open |
| Subject Keyword | Book Name: Introduction To Computer and Network Security History and Philosophy of Science Security Theoretical Encryption Output Channel Attacks Defeated Beaten |
| Content Type | Text |
| Resource Type | Chapter |