26.01.2014 Views

MODERN CRYPTOGRAPHY

MODERN CRYPTOGRAPHY

MODERN CRYPTOGRAPHY

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Side Channel Attacks<br />

To find a cryptographic key<br />

• Brute force attacks try to find the secret key by<br />

random trial and error<br />

• Side channel attacks try to use additional information<br />

drawn from the physical implementation of the<br />

cryptographic algorithm at hand so as to be<br />

substantially better than trial and error<br />

IMA 2009 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!