22
submitted 10 months ago* (last edited 10 months ago) by HiddenLayer5@lemmy.ml to c/security@lemmy.ml
you are viewing a single comment's thread
view the rest of the comments
[-] HiddenLayer5@lemmy.ml 5 points 9 months ago

According to the FAQ:

The key extraction attacks finds the secret key bits one by one, sequentially. For each bit, the attacker crafts a ciphertext of a special form, that makes the acoustic leakage depend specifically on the value of that bit. The attacker then triggers decryption of that chosen ciphertext, records the resulting sound, and analyzes it.

Which sounds to me like the latter?

this post was submitted on 01 Jan 2024
22 points (84.4% liked)

Security

4987 readers
2 users here now

Confidentiality Integrity Availability

founded 4 years ago
MODERATORS