From Wikipedia, the free encyclopedia
Content deleted Content added
|
|
|
||
| Line 1: | Line 1: | ||
|
{{db-u6|bot=CSD U6 Bot|bot_timestamp=2025-12-19}} |
|||
|
In [[computer security]], a ”’side-channel attack”’ is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to sensitive information. These attacks differ from those targeting flaws in the design of [[Cryptography|cryptographic]] [[Computer protocol|protocols]] or [[Algorithm|algorithms]]. ([[Cryptanalysis]] may identify vulnerabilities relevant to both types of attacks). |
In [[computer security]], a ”’side-channel attack”’ is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to sensitive information. These attacks differ from those targeting flaws in the design of [[Cryptography|cryptographic]] [[Computer protocol|protocols]] or [[Algorithm|algorithms]]. ([[Cryptanalysis]] may identify vulnerabilities relevant to both types of attacks). |
||
Latest revision as of 02:27, 19 December 2025
| This user page was tagged by CSD U6 Bot, because it may meet Wikipedia’s criteria for speedy deletion as a user subpage of a user who has made few or no edits outside of user space, which has not been edited by a human in at least six months, excluding redirects, .js pages, .css pages, and Wikipedia Books. See CSD U6.%5B%5BWP%3ACSD%23U6%7CU6%5D%5D%3A+Abandoned+user+subpage+of+non-contributor+%E2%80%93+to+retrieve+it%2C+see+%5B%5BWP%3AREFUND%2FU6%5D%5DU6
If this user page does not meet the criteria for speedy deletion, please remove this notice. If you plan to improve this subpage, simply and remove the |
In computer security, a side-channel attack is a type of security exploit that leverages information inadvertently leaked by a system—such as timing, power consumption, or electromagnetic or acoustic emissions—to gain unauthorized access to sensitive information. These attacks differ from those targeting flaws in the design of cryptographic protocols or algorithms. (Cryptanalysis may identify vulnerabilities relevant to both types of attacks).
Some side-channel attacks require technical knowledge of the internal operation of the system, others such as differential power analysis are effective as black-box attacks. The rise of Web 2.0 applications and software-as-a-service has also significantly raised the possibility of side-channel attacks on the web, even when transmissions between a web browser and server are encrypted (e.g. through HTTPS or WiFi encryption), according to researchers from Microsoft Research and Indiana University.[1]

