AI Engineer - Learn how to integrate AI into software applications
Gain a Splash of New Skills - Coursera+ Annual Nearly 45% Off
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the critical security vulnerabilities that arise when cryptographic algorithms are implemented on embedded devices in this comprehensive conference talk. Delve into the concept of side-channel attacks, where seemingly secure cryptographic implementations leak sensitive information through timing variations, power consumption patterns, and electromagnetic emissions that correlate with secret key material. Learn how adversaries can exploit these unintended information leaks to gradually extract secrets and compromise supposedly secure cryptographic schemes. Examine specific attack methodologies targeting mainstream cryptographic algorithms including AES, RSA, and ECDSA, understanding how theoretical security can break down in real-world implementations. Discover practical countermeasures and implementation techniques used to protect against side-channel leakage when deploying cryptography on resource-constrained embedded systems. Gain insights into the intersection of theoretical cryptography and practical security considerations, essential for developers working with secure embedded systems and IoT devices.
Syllabus
Cryptographic Side-Channels on Embedded Devices - Tjerand Silde - NDC TechTown 2025
Taught by
NDC Conferences