For this scenario, timing attacks could also be used by Eve on the AES encryption, along with Power Analysis. Power Analysis involves observing the power consumption of the device at any point during the cryptographic process as power consumption can be seen to be related to the instruction being executed and data being process (e.g. multiplication uses more power than addition, etc). Timing analysis is also relevant for symmetric ciphers as well as public key algorithms. In this case, information about the key or plaintext could be obtained by observing how long it takes the given implantation to perform decryptions on various cipher texts. This exploits
There is also a weakness in using the Electronic Code Book mode of operation. Electronic Code Book is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. The same plaintext value will always result in the same cipher text value. …