Back to Search Start Over

How to Break Cryptography with Your Bare Hands.

Authors :
Talbot, David
Source :
MIT Technology Review. Nov/Dec2014, Vol. 117 Issue 6, p20-20. 3/4p. 1 Diagram.
Publication Year :
2014

Abstract

The article discusses research by computer security expert Eran Tromer on the use of measured electrical potential transferred from computers to humans to extract encryption keys. Topics include the study of power consumption of computers to reveal cryptographic keys, hackers' use of indirect ways to extract data, known as "side channel" attacks, despite software protection on computers, and the ability to avoid side channel attacks by adding random data to computations in cryptography software.

Details

Language :
English
ISSN :
2749649X
Volume :
117
Issue :
6
Database :
Academic Search Index
Journal :
MIT Technology Review
Publication Type :
Periodical
Accession number :
101619290