Summary. In this article described main types of SCA, their particularity and how they can be applied to modern, wide-used cryptosystems to break their security.
Keywords: SCA, encryption algorithm, hardware encryption, cryptosystem, side channel analysis, information security.