Q. With reference to Side Channel Attacks (SCAs) consider the following statements:
1.Acoustic Side Channel Attacks (ASCA) uses the sound of clicks generated by a keyboard to analyze keystrokes and interpret what is being typed to leak sensitive information.
2.A side-channel attack involves exploiting software vulnerabilities to gain unauthorized access to a computer system’s sensitive data.
Select the correct statements using the codes given below:
Answer: A
Notes:
Explanation –
Statement 1 is correct. ASCA uses the sound of clicks generated by a keyboard to analyze keystrokes and interpret what is being typed to leak sensitive information.
Statement 2 is incorrect. A side-channel attack involves exploiting unintended physical or indirect signals, such as timing, power consumption, or electromagnetic emissions, to gather sensitive information from a computer system. It is a method of hacking a cryptographic algorithm based on the analysis of auxiliary systems used in the encryption method.
Source: ForumIAS