Aside from a brute-force attack, the only one that I know of is the power attack. In this type of attack, the hacker...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
attempts to determine the value of the private key by monitoring the power consumption of a smartcard while it is computing the given cipher text.
The latest in the evolution is called leakage-based differential power analysis (LDPA). This method was created in response to power attack resistant cryptosystems and involves measuring the power leakage during decryption instead of the direct power usage.
- Learn how to deal with ransomware, an advanced encryption algorithm exploit.
- Can DRAM remanence compromise encryption keys? Find out more.
- Read some encryption worst practices to avoid.
Related Q&A from David Griffeth
Are users at your enterprise creating weak passwords that could potentially lead to serious data breaches? In this identity and access management ...continue reading
Virtualization is a technology that's taking off, but how can information security professionals know how it will interact with their existing ...continue reading
Periodic access reviews for enterprise identity and access management (IAM) can help ensure the necessary personnel have access to essential systems ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.