NSA Suite B Crypto, Keys, and Side Channel Attacks
NSA’s Suite B approved crypto is strong when implemented properly. But is it? Common implementations of AES, SHA-256 and ECDSA can leak secrets via radiated emissions and power consumption measurements. See how keys can be extracted from all three algorithms and learn how developers and product integrators can address side channel vulnerabilities.