NSA Suite B Crypto, Keys, and Side Channel Attacks

  • Wednesday, February 27, 2013 | 9:20 AM – 10:20 AM | Room: Room 310
View all Sessions

NSA’s Suite B approved crypto is strong when implemented properly. But is it? Common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. See how keys can be extracted from all three algorithms and learn how developers and product integrators can address side channel vulnerabilities.


This document was retrieved from http://www.rsaconference.com/events/us13/agenda/sessions/179/nsa-suite-b-crypto-keys-and-side-channel-attacks on Thu, 18 Dec 2014 10:25:40 -0500.
© 2014 EMC Corporation. All rights reserved.