logo

Crowdly

A company implements AES-128 encryption on IoT devices, but a researcher discov...

✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.

A company implements AES-128

encryption on IoT devices, but a researcher discovers that by

measuring

power consumption

, they can recover the AES key in milliseconds.

Which mitigation technique would

be

most effective against this attack?

a) Using a larger key size

(AES-256 instead of AES-128)

b) Implementing

constant-time

operations to prevent data-dependent

leakage

c) Encrypting the plaintext

twice with different keys

d) Using

hash functions instead of block ciphers

0%
100%
0%
0%
More questions like this

Want instant access to all verified answers on lms.vit.ac.in?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!