In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol...
31 KB (3,618 words) - 16:36, 25 May 2025
KeeLoq (section Side-channel attacks)
most devastating practical consequence of the side-channel analysis is an attack in which an attacker, having previously learned the system's master...
13 KB (1,561 words) - 23:57, 27 May 2024
In cryptography, a timing attack is a side-channel attack in which the attacker attempts to compromise a cryptosystem by analyzing the time taken to execute...
13 KB (1,616 words) - 12:26, 4 June 2025
In cryptography, electromagnetic attacks are side-channel attacks performed by measuring the electromagnetic radiation emitted from a device and performing...
27 KB (3,404 words) - 16:42, 5 September 2024
successful published attacks against the full AES were side-channel attacks on some specific implementations. In 2009, a new related-key attack was discovered...
50 KB (5,678 words) - 12:38, 4 June 2025
a distance (computer programming) Don't-care term Sequence point Side-channel attack Undefined behaviour Unspecified behaviour Frame problem Spuler, David...
10 KB (1,119 words) - 16:22, 16 November 2024
(TMTO) attacks, but introduces possible side-channel attacks. Argon2i is optimized to resist side-channel attacks. It accesses the memory array in a password...
14 KB (1,491 words) - 04:51, 31 March 2025
Hail Mary Cloud Key derivation function MD5CRK Metasploit Express Side-channel attack TWINKLE and TWIRL Unicity distance RSA Factoring Challenge Secure...
21 KB (2,168 words) - 17:09, 27 May 2025
consumption, or branch measurements are exposed to an attacker performing a side-channel attack. The algorithm uses the same representation as from double-and-add...
32 KB (4,325 words) - 06:24, 23 May 2025
Acoustic cryptanalysis (category Side-channel attacks)
Acoustic cryptanalysis is a type of side-channel attack that exploits sounds emitted by computers or other devices. Most of the modern acoustic cryptanalysis...
10 KB (1,022 words) - 08:46, 24 May 2025
A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence...
12 KB (1,350 words) - 12:08, 18 May 2025
Computer security (redirect from Car cyber attack)
Aaron; Bangay, Shaun (June 2022). "Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures". International...
220 KB (22,314 words) - 07:16, 2 June 2025
A man-on-the-side attack is a form of active attack in computer security similar to a man-in-the-middle attack. Instead of completely controlling a network...
9 KB (1,183 words) - 10:13, 12 February 2025
Encryption (section Attacks and countermeasures)
inherent biases and backdoors or by exploiting physical side effects through Side-channel attacks. For example, RC4, a stream cipher, was cracked due to...
34 KB (3,645 words) - 07:39, 2 June 2025
Cache timing attacks also known as Cache attacks are a type of side-channel attack that allows attackers to gain information about a system purely by...
3 KB (303 words) - 03:45, 5 December 2023
preimage attack where a specific target hash value is specified. There are roughly two types of collision attacks: Classical collision attack Find two...
17 KB (2,041 words) - 08:16, 19 February 2025
Serge Vaudenay's padding oracle attack that was previously thought to have been fixed, that uses a timing side-channel attack against the message authentication...
3 KB (367 words) - 11:37, 22 May 2025
security, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access...
38 KB (4,273 words) - 07:48, 8 May 2025
Merkle tree (section Second preimage attack)
second-preimage attack in which an attacker creates a document other than the original that has the same Merkle hash root. For the example above, an attacker can...
15 KB (1,804 words) - 11:52, 27 May 2025
of network eavesdropping in which special equipment is used for a side-channel attack on the electromagnetic emissions of electronic devices. While electromagnetic...
13 KB (1,476 words) - 00:15, 15 January 2025
birthday attack is a bruteforce collision attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be used...
18 KB (2,307 words) - 05:46, 2 June 2025
Cryptanalysis (redirect from Cryptanalytic attack)
of cryptographic algorithms, cryptanalysis includes the study of side-channel attacks that do not target weaknesses in the cryptographic algorithms themselves...
45 KB (5,241 words) - 03:13, 31 May 2025
Tempest (codename) (redirect from Tempest attack)
intelligence-bearing signals which, if intercepted and analyzed (side-channel attack), may disclose the information transmitted, received, handled, or...
35 KB (4,247 words) - 20:02, 24 May 2025
Power analysis (category Side-channel attacks)
is a form of side channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic...
10 KB (1,194 words) - 13:39, 19 January 2025
attack is a type of attack where an attacker can use Hash(message1) and the length of message1 to calculate Hash(message1 ‖ message2) for an attacker-controlled...
8 KB (1,082 words) - 12:51, 23 April 2025
Consequently, it is important to counteract side-channel attacks (e.g., timing or simple/differential power analysis attacks) using, for example, fixed pattern...
39 KB (4,677 words) - 13:04, 20 May 2025
- A slow but concise alternate implementation, does not include side-channel attack protection Supercop reference implementation (C language with inline...
18 KB (2,117 words) - 17:33, 3 June 2025
Differential fault analysis (redirect from Differential fault attack)
Differential fault analysis (DFA) is a type of active side-channel attack in the field of cryptography, specifically cryptanalysis. The principle is to...
3 KB (401 words) - 03:26, 31 July 2024
sliding computational cost, used to reduce vulnerability to brute-force attacks. PBKDF2 is part of RSA Laboratories' Public-Key Cryptography Standards...
13 KB (1,337 words) - 12:18, 2 June 2025
Spectre (security vulnerability) (redirect from Spectre attack)
one of the speculative execution CPU vulnerabilities which involve side-channel attacks. These affect modern microprocessors that perform branch prediction...
83 KB (7,089 words) - 02:01, 13 May 2025