1. Consider all the operations a computer might perform with a cryptographic key. Which ones might have timing characteristics that could leak information about the key?
2. Find a new product or system that manipulates secret data. This might be the same product or system you analyzed for
Exercise 1.8. Conduct a security review of that product or system as described in Section 1.12, this time focusing on issues surrounding side-channel attacks.
Exercise 1.8
Find a new product or system that was announced or released within the last three months. Conduct a security review of that product or system as described in Section 1.12. Pick one of the assets that you identified and construct an attack tree for compromising that asset.