Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption

jim bell jdb10987 at yahoo.com
Tue Mar 8 23:57:10 PST 2022


https://thehackernews.com/2022/03/researchers-demonstrate-new-side.html
"A group of academics from the North Carolina State University and Dokuz Eylul University have demonstrated what they say is the "first side-channel attack" on homomorphic encryption that could be exploited to leak data as the encryption process is underway."
"Basically, by monitoring power consumption in a device that is encoding data for homomorphic encryption, we are able to read the data as it is being encrypted," Aydin Aysu, one of the authors of the study, said. "This demonstrates that even next generation encryption technologies need protection against side-channel attacks."

"Homomorphic Encryption is a form of encryption that allows certain types of computation to be performed directly on encrypted data without having to decrypt it in the first place."
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: text/html
Size: 2733 bytes
Desc: not available
URL: <https://lists.cpunks.org/pipermail/cypherpunks/attachments/20220309/437a1ba0/attachment.txt>


More information about the cypherpunks mailing list