Q. With reference to Side Channel Attacks (SCAs) consider the following statements:
1.Acoustic Side Channel Attacks (ASCA) uses the sound of clicks generated by a keyboard to analyze keystrokes and interpret what is being typed to leak sensitive information. 
2.A side-channel attack involves exploiting software vulnerabilities to gain unauthorized access to a computer system’s sensitive data.
Select the correct statements using the codes given below:
Red Book
Red Book

[A] 1 only

[B] 2 only

[C] Both 1 and 2

[D] Neither 1 nor 2

Answer: A
Notes:

Explanation –

Statement 1 is correct. ASCA uses the sound of clicks generated by a keyboard to analyze keystrokes and interpret what is being typed to leak sensitive information.

Statement 2 is incorrect. A side-channel attack involves exploiting unintended physical or indirect signals, such as timing, power consumption, or electromagnetic emissions, to gather sensitive information from a computer system. It is a method of hacking a cryptographic algorithm based on the analysis of auxiliary systems used in the encryption method.

Source: ForumIAS

Blog
Academy
Community