8 I’ve Got the Power: Introduction to Power Analysis

You’ll often hear that cryptographic algorithms are unbreakable, regardless of the huge advances in computing power. That is true. However, as you’ll learn in this chapter, the key to finding vulnerabilities in cryptographic algorithms lies in their implementation, no matter how “military grade” they are.

That said, we won’t be discussing crypto implementation errors, such as failed bounds checks, in this chapter. Instead, we’ll exploit the very nature of digital electronics using side channels to break algorithms that, on paper, appear to be secure. A side channel is some observable aspect ...

Get The Hardware Hacking Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.