Remove encryption with unusual techniques.

. Hacktivism

19:08:02 Remove encryption with unusual techniques.
In 1998 Paul Kocher criptografo developed a method to deduce the secret key hidden in a smart card with a cryptographic technique abnormal, ie monitoring small fluctuations of comsumo of electrical energy inside. Three years later, the headlines were dedicated to a technique that compromised implementations of the RSA algorithm, by calculating the time spent on a system that implement certain functions. Kocher is now president of Cryptography Research, Inc. , and argues that attacks like these are even simpler as the hardware and software combinations are becoming increasingly complex and difficult to debug. According to him, in fact, by a curious paradox Moore's Law increasingly undermines the security of encryptions: "If you double the lines of code you will have four times as many security issues." And the same applies to the hardware components that are not adequately exploited not to mention the team dedicated to the control: the more possibilities there are many more that do not adequately address the problem. Another loose cannon for the security of encryption are the small computational errors that compromise the keys used. The company Kocher tested for a product takes two weeks and the operation costs you $ 32,000 for study the different components to find out if there are extraneous, and evaluate the implementation details to determine how many similar systems have failed. The culmination of his thought is: "the duration of the safety of a product often depends on the availability on the market of technologies most vulnerable."