NSA Suite B Crypto, Keys, and Side Channel Attacks

  • Wednesday, February 27, 2013 | 9:20 AM – 10:20 AM | Room: Room 310
View all Sessions

NSA’s Suite B approved crypto is strong when implemented properly. But is it? Common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. See how keys can be extracted from all three algorithms and learn how developers and product integrators can address side channel vulnerabilities.


This document was retrieved from on Wed, 28 Jan 2015 17:15:35 -0500.
© 2015 EMC Corporation. All rights reserved.