ELI5: What are Side-Channel Attacks?

Instead of trying to pick a lock, you listen to the tiny clicks it makes to figure out the combination. Side-channel attacks learn secrets by watching how a computer behaves — its speed, heat, or power use — not by attacking the code directly.

Definition

Side-channel attacks extract secret information by analyzing the physical characteristics of a cryptographic system’s operation—such as execution timing, power consumption, electromagnetic radiation, or even acoustic emanations—rather than breaking the underlying algorithm. These attacks can recover cryptographic keys from hardware devices that correctly implement mathematically sound algorithms, by observing how the implementation behaves physically.

Key Details

  • Timing attacks: Measure the time an operation takes—operations that vary based on key bits reveal information about the key (e.g., RSA decryption time).
  • Power analysis: Measure power consumption during cryptographic operations; SPA (Simple Power Analysis) and DPA (Differential Power Analysis).
  • Electromagnetic (EM) attacks: Measure EM emissions from ICs—similar to power analysis but more versatile.
  • Acoustic cryptanalysis: Capture sounds made by hardware during computation—demonstrated against RSA-4096.
  • Spectre/Meltdown: CPU cache timing side-channels in modern processors—allow user-space code to read kernel memory.

Connections