NSA Suite B Crypto, Keys, and Side Channel Attacks

  • Wednesday, February 27, 2013 | 9:20 AM – 10:20 AM | Room: Room 310

View all Sessions

NSA’s Suite B approved crypto is strong when implemented properly. But is it? Common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. See how keys can be extracted from all three algorithms and learn how developers and product integrators can address side channel vulnerabilities.


This document was retrieved from on Sun, 29 May 2016 13:20:00 -0400.
© 2016 EMC Corporation. All rights reserved.