Security Practices

Side-Channel Attack

A side-channel attack extracts secret information from a device by analyzing its physical emissions — power consumption, electromagnetic radiation, timing variations, or acoustic signals — rather than attacking the cryptographic algorithm directly.

How It Works

When a device performs cryptographic operations like signing a Bitcoin transaction, it consumes varying amounts of power and emits electromagnetic signals that correlate with the secret data being processed. A skilled attacker with physical access and specialized equipment can measure these variations to reconstruct private keys. Power analysis, electromagnetic analysis, and timing attacks are the most common side-channel techniques.

Simple power analysis (SPA) observes the power trace of a single cryptographic operation to identify patterns. Differential power analysis (DPA) uses statistical methods across many operations to extract key bits. Timing attacks exploit the fact that some operations take different amounts of time depending on the data being processed. These attacks don't break the math — they exploit the physics of computation.

Hardware wallets defend against side channels using secure elements that implement constant-time operations, power consumption randomization, and electromagnetic shielding. The Coldcard's secure element, for example, is designed to resist DPA attacks. Air-gapped devices reduce exposure by limiting when the device is powered on and connected. For most individual users, side-channel attacks are a sophisticated threat primarily relevant to high-value targets, but choosing hardware wallets with proper secure element implementations provides defense in depth.

Key Points

  • Side-channel attacks exploit physical emissions, not cryptographic weaknesses
  • Power analysis can extract private keys by measuring a device's electricity consumption during signing
  • Secure elements in quality hardware wallets implement countermeasures like constant-time operations
  • Air-gapped operation reduces the window of exposure for physical attacks
  • These attacks typically require physical access and specialized equipment, making them a targeted threat