NSA Suite B Crypto, Keys, and Side Channel Attacks

  • Wednesday, February 27, 2013 | 9:20 AM – 10:20 AM | Room: Room 310

View all Sessions

NSA’s Suite B approved crypto is strong when implemented properly. But is it? Common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. See how keys can be extracted from all three algorithms and learn how developers and product integrators can address side channel vulnerabilities.


This document was retrieved from on Mon, 22 Jul 2019 06:46:37 -0400.