Side-Channel Attacks

Pankaj Rohatgi, IBM T. J. Watson Research Center


Timing Attacks

Timing Attack Example

Extensions, Countermeasures, and Further Reading

Power Analysis Attacks

Information Within Power Consumption Signals

Simple Power Analysis

Differential Power Analysis

EM Analysis

Understanding EM Emanations

EM Attack Equipment

EM Attacks on an RSA Accelerator

Multiplicity of EM Channels

Advanced Side-Channel Analysis Techniques

Template Attacks

Template Attack Technique

Template Attack on RC4


Further Reading

Reverse Engineering Using Side Channels: First Steps

Combining Side Channels with Invasive or Fault Attacks

Active Side-Channel Attacks

Combining Classical and Side-Channel Cryptanalysis

Connections Between Side-Channel and Covert-Channel Analysis


Cross References



Maintaining information integrity and confidentiality is a core security requirement in most systems. These goals are typically realized using a combination of techniques such as authentication, discretionary and mandatory access control, use of high-assurance trusted components, encryption, integrity tags, and secure communication protocols.

In most commercial environments, however, these generic techniques are applied and analyzed only with respect to an abstract model of the system being protected. Thus, gaps between the model and actual implementation can open up a system to attacks that its designers never anticipated. Poorly designed and implemented ...

Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.