Back to Search
Start Over
How to Break Cryptography with Your Bare Hands.
- Source :
-
MIT Technology Review . Nov/Dec2014, Vol. 117 Issue 6, p20-20. 3/4p. 1 Diagram. - Publication Year :
- 2014
-
Abstract
- The article discusses research by computer security expert Eran Tromer on the use of measured electrical potential transferred from computers to humans to extract encryption keys. Topics include the study of power consumption of computers to reveal cryptographic keys, hackers' use of indirect ways to extract data, known as "side channel" attacks, despite software protection on computers, and the ability to avoid side channel attacks by adding random data to computations in cryptography software.
Details
- Language :
- English
- ISSN :
- 2749649X
- Volume :
- 117
- Issue :
- 6
- Database :
- Academic Search Index
- Journal :
- MIT Technology Review
- Publication Type :
- Periodical
- Accession number :
- 101619290