Sidokanalsattacker
Sidokanalsattacker is a term used to describe an attacker who exploits side-channel information produced by the physical implementation of a device or system that handles sensitive data. Rather than attacking software, networks, or cryptographic algorithms directly, a sidokanalsattacker seeks leakage from the device’s operation, such as how long computations take, how much power is drawn, electromagnetic emissions, acoustic signals, or memory access patterns, all of which can correlate with secret information like cryptographic keys.
Common targets for sidokanalsattacks include cryptographic modules, smart cards, embedded devices, and other hardware running security-sensitive
The field emerged in the 1990s with demonstrations that practical secret keys could be recovered from physical
See also: side-channel attack, cryptographic hardware security, fault injection, secure coding practices.