Cryptography key security


Side-Channel Attack Steals Crypto Key from Co-Located Virtual Machines

Side-channel attacks against cryptography keys have, until now, been limited to physical machines. Researchers have long made accurate determinations about crypto keys by studying anything from variations in power consumption to measuring how long it takes for a computation to complete.A team of researchers from the University of North Carolina, University of Wisconsin, and RSA Security has ramped up the stakes, having proved in controlled conditions that it’s possible to steal a crypto key from a virtual machine.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.