Navigating Side-Channel Attacks: A Comprehensive Overview of Cryptographic System Vulnerabilities

Authors

  • Muhammad Kaleem Department of IT, Faculty of Computing & IT, University of Sargodha, Pakistan.
  • Muhammad Azhar Mushtaq Department of IT, Faculty of Computing & IT, University of Sargodha, Pakistan.
  • Sadaqat Ali Ramay Department of Computer Science Times institute, Multan, Pakistan.
  • Aamir Mahmood Sr. Cyber Security Specialist, Jazan Integrated Gasification and Power Company Riyadh, Saudi Arabia.
  • Tahir Abbas Khan Department of Computer Science Times institute, Multan, Pakistan.
  • Sayyid Kamran Hussain Department of Computer Science Times institute, Multan, Pakistan.
  • Adeel Anwar Director of IT (pre-opening), Jumeirah Hotels and Resorts Kingdom of Saudi Arabia.
  • Hassnain Abdullah Bhatti (Telecom Engineer) Director Sales and Partnership,ABCC - Abdullah Bhatti Construction Company PVT Ltd. Multan, 60000 Punjab, Pakistan.

Keywords:

Side-channel, Cybersecurity, Paradigms

Abstract

Side-channel attacks have become increasingly important in the dynamic field of cybersecurity, posing a challenge to the security paradigms of cryptographic systems and implementations. The goal of this thorough review paper is to give a thorough understanding of side-channel assaults by examining the various kinds, subtypes, and difficulties that they present for modern security solutions. Understanding the taxonomy of side-channel attack vulnerabilities is essential for creating effective defense methods because these assaults target a wide range of vulnerabilities, from power consumption patterns to acoustic emanations.  

Downloads

Published

2024-09-01

How to Cite

Muhammad Kaleem, Muhammad Azhar Mushtaq, Sadaqat Ali Ramay, Aamir Mahmood, Tahir Abbas Khan, Sayyid Kamran Hussain, Adeel Anwar, & Hassnain Abdullah Bhatti. (2024). Navigating Side-Channel Attacks: A Comprehensive Overview of Cryptographic System Vulnerabilities. Journal of Computing & Biomedical Informatics, 7(02). Retrieved from https://jcbi.org/index.php/Main/article/view/626