The product uses a hardware module implementing a cryptographic algorithm that writes sensitive information about the intermediate state or results of its cryptographic operations via one of its output wires (typically the output port containing the final result).
Impact: Read MemoryRead Application Data
Mathematically sound cryptographic algorithms rely on their correct implementation for security. These assumptions might break when a hardware crypto module leaks intermediate encryption states or results such that they can be observed by an adversary. If intermediate state is observed, it might be possible for an attacker to identify the secrets used in the cryptographic operation.
Effectiveness: High
Effectiveness: High
01 | module crypto_core_with_leakage 02 | (
verilog01 | module crypto_core_without_leakage 02 | (
verilog