Simple Power Analysis (SPA)
Special methodology to make side-channel attacks
To help you find your way through major technical terms used in the cybersecurity field
Special methodology to make side-channel attacks
Public key cryptographic algorithm based on elliptic curves, used for e.g. generation and verification of digital signatures
Cryptographic hash function mainly used in digital signatures, message authentication codes, and pseudorandom number generators.
Symmetric encryption algorithm, specifically a blockcipher, designed for data encryption
Symmetric encryption is a method of cryptography in which a single key is responsible for encrypting and decrypting data. The parties involved share this key, the password or a secret phrase and can use them to decrypt or encrypt messages of their choice.
A complete embedded system on a single chip, which may include memory, one or more microprocessors, interface devices, or any other component necessary to perform the expected function.
Subtype of side-channel attack that uses two identical products, one known and one unknown, to perform pattern recognition between the two and thus retrieve data from the unknown product
Principle of the Trojan horse, it can be hardware or software. A trojan allows you to obtain information about what is going on in the system or to modify its operation.