Attacks that rely on the flaws in implementation procedure are termed Implementation Attacks. In the process of code optimization for optimum speed and memory, programmers often neglect the transfer of variables and the deletion of trace elements. Care must be taken to delete the round keys and the main key when the encryption or decryption process is complete. It is also to the best advantage if only the specific authorized modules have access to the cryptographic modules. If any attack or discrepancy is detected in the run-time environment, a specific data log must be created or appended and key scheduling must be executed again. Key scheduling takes care of deleting the prior keys and generating or obtaining a new set of keys.
--NEXT--> Side-channel Cryptanalysis