Site icon Break IC, Recover MCU, Microcontroller Reverse Engineering

Prevent Timing IC Attack

To prevent Timing IC attack the techniques used for blinding signatures can be used. The general idea is to prevent the attacker knowing the input to the modular exponentiation operation by mixing the input with a chosen random value.

To prevent Timing IC attack the techniques used for blinding signatures can be used. The general idea is to prevent the attacker knowing the input to the modular exponentiation operation by mixing the input with a chosen random value
Exit mobile version