side channel - meaning and definition. What is side channel
Diclib.com
ChatGPT AI Dictionary
Enter a word or phrase in any language 👆
Language:

Translation and analysis of words by ChatGPT artificial intelligence

On this page you can get a detailed analysis of a word or phrase, produced by the best artificial intelligence technology to date:

  • how the word is used
  • frequency of use
  • it is used more often in oral or written speech
  • word translation options
  • usage examples (several phrases with translation)
  • etymology

What (who) is side channel - definition

ANY ATTACK BASED ON INFORMATION GAINED FROM THE IMPLEMENTATION OF A COMPUTER SYSTEM
Sidechannel attack; Side channel; Side-channel attacks; Side channel attack; Side-channel; Cache side-channel attack; PortSmash; Side channels
  • algorithm]] without multiplication, the right (broader) peak – step with multiplication, allowing an attacker to read bits 0, 1.

Side-channel attack         
In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g.
A-side         
THE TWO SIDES OF 78, 45, AND 33 1/3 RPM PHONOGRAPH RECORDS AND CASSETTE TAPES
B-sides; A-Side; B side; B Side; B-Side; A Side; A side; A-side; Double A-sided; Double A-side; Double A-Side; Double B-side; Double B-Side; Triple A-side; Triple A-Side; Triple B-side; Triple B-Side; Backed with; B-side; Double a side; Double a-side; Double A side; C/w; A-Side and B-Side; Side (recording); Side A (Band); B/w; A-side & B-side; A and B side; Double-A side; B Side (song); Side-B; Side B; Side A; A-sides; Dual single
(A-sides)
The A-side of a record that has been released as a single is the main song on it. You can also refer to the side of the record that contains this song as the A-side. Compare B-side
.
N-COUNT
A-side         
THE TWO SIDES OF 78, 45, AND 33 1/3 RPM PHONOGRAPH RECORDS AND CASSETTE TAPES
B-sides; A-Side; B side; B Side; B-Side; A Side; A side; A-side; Double A-sided; Double A-side; Double A-Side; Double B-side; Double B-Side; Triple A-side; Triple A-Side; Triple B-side; Triple B-Side; Backed with; B-side; Double a side; Double a-side; Double A side; C/w; A-Side and B-Side; Side (recording); Side A (Band); B/w; A-side & B-side; A and B side; Double-A side; B Side (song); Side-B; Side B; Side A; A-sides; Dual single
¦ noun the side of a pop single regarded as the main one.

Wikipedia

Side-channel attack

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation. (Cryptanalysis also includes searching for side-channel attacks.) Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks.

Some side-channel attacks require technical knowledge of the internal operation of the system, although others such as differential power analysis are effective as black-box attacks. The rise of Web 2.0 applications and software-as-a-service has also significantly raised the possibility of side-channel attacks on the web, even when transmissions between a web browser and server are encrypted (e.g. through HTTPS or WiFi encryption), according to researchers from Microsoft Research and Indiana University. Many powerful side-channel attacks are based on statistical methods pioneered by Paul Kocher.

Attempts to break a cryptosystem by deceiving or coercing people with legitimate access are not typically considered side-channel attacks: see social engineering and rubber-hose cryptanalysis.

General classes of side-channel attack include:

  • Cache attack — attacks based on attacker's ability to monitor cache accesses made by the victim in a shared physical system as in virtualized environment or a type of cloud service.
  • Timing attack — attacks based on measuring how much time various computations (such as, say, comparing an attacker's given password with the victim's unknown one) take to perform.
  • Power-monitoring attack — attacks that make use of varying power consumption by the hardware during computation.
  • Electromagnetic attack — attacks based on leaked electromagnetic radiation, which can directly provide plaintexts and other information. Such measurements can be used to infer cryptographic keys using techniques equivalent to those in power analysis or can be used in non-cryptographic attacks, e.g. TEMPEST (aka van Eck phreaking or radiation monitoring) attacks.
  • Acoustic cryptanalysis — attacks that exploit sound produced during a computation (rather like power analysis).
  • Differential fault analysis — in which secrets are discovered by introducing faults in a computation.
  • Data remanence — in which sensitive data are read after supposedly having been deleted. (e.g. Cold boot attack)
  • Software-initiated fault attacks — Currently a rare class of side channels, Row hammer is an example in which off-limits memory can be changed by accessing adjacent memory too often (causing state retention loss).
  • Allowlist — attacks based on the fact that the allowlisting devices will behave differently when communicating with allowlisted (sending back the responses) and non-allowlisted (not responding to the devices at all) devices. Allowlist-based side channel may be used to track Bluetooth MAC addresses.
  • Optical - in which secrets and sensitive data can be read by visual recording using a high resolution camera, or other devices that have such capabilities (see examples below).

In all cases, the underlying principle is that physical effects caused by the operation of a cryptosystem (on the side) can provide useful extra information about secrets in the system, for example, the cryptographic key, partial state information, full or partial plaintexts and so forth. The term cryptophthora (secret degradation) is sometimes used to express the degradation of secret key material resulting from side-channel leakage.