It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
Security researchers have successfully broken one of the most secure encryption algorithms, 4096-bit RSA, by listening – yes, with a microphone — to a computer as it decrypts some encrypted data. The attack is fairly simple and can be carried out with rudimentary hardware. The repercussions for the average computer user are minimal, but if you’re a secret agent, power user, or some other kind of encryption-using miscreant, you may want to reach for the Rammstein when decrypting your data.
Without going into too much detail, the researchers focused on a very specific encryption implementation: The GnuPG (an open/free version of PGP) 1.x implementation of the RSA cryptosystem. With some very clever cryptanalysis, the researchers were able to listen for telltale signs that the CPU was decrypting some data, and then listening to the following stream of sounds to divine the decryption key. The same attack would not work on different cryptosystems or different encryption software — they’d have to start back at the beginning and work out all of the tell-tale sounds from scratch.
The researchers successfully extracted decryption keys over a distance of four meters (13 feet) with a high-quality parabolic microphone. Perhaps more intriguingly, though, they also managed to pull of this attack with a smartphone placed 30 centimeters (12 inches) away from the target laptop. The researchers performed the attack on different laptops and desktops, with varying levels of success
Tempest (often spelled TEMPEST) is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled, or otherwise processed by any information-processing equipment.
Compromising emanations consist of electrical, mechanical, or acoustical energy intentionally or by mishap unintentionally emitted by any number of sources within equipment/systems which process national security information. This energy may relate to the original pre- or non-encrypted message, or information being processed, in such a way that it can lead to recovery of the plaintext. Laboratory and field tests have established that such CE can be propagated through space and along nearby conductors. The interception/propagation ranges and analysis of such emanations are affected by a variety of factors, e.g., the functional design of the information processing equipment; system/equipment installation; and, environmental conditions related to physical security and ambient noise. The term "compromising emanations" rather than "radiation" is used because the compromising signals can, and do, exist in several forms such as magnetic- and/or electric field radiation, line conduction, or acoustic emissions.[1]
I remember when I first became aware of the field as teen after reading in some text file about how a computer screen could be reconstituted by observing emissions from a CRT through a wall.
link
Conversely, a sufficiently strong wide-band noise source can mask the informative signals, though ergonomic concerns may render this unattractive.
Q12: Won't the attack be foiled by loud fan noise, or by multitasking, or by several computers in the same room?
Usually not. The interesting acoustic signals are mostly above 10KHz, whereas typical computer fan noise and normal room noise are concentrated at lower frequencies and can thus be filtered out. In task-switching systems, different tasks can be distinguished by their different acoustic spectral signatures. Using multiple cores turns out to help the attack (by shifting down the signal frequencies). When several computers are present, they can be told apart by spatial localization, or by their different acoustic signatures (which vary with the hardware, the component temperatures, and other environmental conditions).
PhoenixOD
reply to post by theantediluvian
I remember when I first became aware of the field as teen after reading in some text file about how a computer screen could be reconstituted by observing emissions from a CRT through a wall.
Ive heard of reading sound from the vibrations on a window pane but that's a new one on me
edit on 18-12-2013 by PhoenixOD because: (no reason given)
In a CRT the image is generated by an electron beam that sweeps back and forth across the screen. The electron beam excites the phosphor coating on the glass and causes it to glow. The strength of the beam determines the brightness of individual pixels (see CRT for a detailed description). The electric signal which drives the electron beam is amplified to hundreds of volts from TTL circuitry. This high frequency, high voltage signal creates electromagnetic radiation that has, according to Van Eck, "a remarkable resemblance to a broadcast TV signal".[1] The signal leaks out from displays and may be captured by an antenna, and once synchronization pulses are recreated and mixed in, an ordinary analog television receiver can display the result. The sync can be recreated either through manual adjustment or by processing the signals emitted by electromagnetic coils as they deflect the CRT's electron beam back and forth.[1]
In the paper, Van Eck reports that in February 1985 a successful test of this concept was carried out with the cooperation of the BBC. Using a van filled with electronic equipment and equipped with a VHF antenna array, they were able to eavesdrop from a "large distance".
Van Eck phreaking and protecting a CRT display from it was demonstrated on an episode of Tech TV's The Screen Savers on December 18, 2003.[5][6]
Arbitrageur
reply to post by PhoenixOD
If you've got good hearing, you can hear the sounds the CPU makes, at least the bottom end of the frequency spectrum they looked at which is down to 10 kHz, well within the range of human hearing. I've heard CPU sounds but I think not everyone can hear them. So, on the one hand, I'm not surprised they are able to pick up these computing sounds with a microphone.
On the other hand, what does surprise me is that they were able to use these sounds to decrypt an encryption key. I'm usually not surprised too much at news or discoveries, so this is a rare discovery that actually surprises me. But when I see how they did it, now I just have to admit they are more clever than I was because I didn't think this hack would work.
However what this also teaches us is that smart phone microphones are far more capable that many people (perhaps including myself) imagined, and that another thread on ATS about what could be communicated wirelessly using sound vastly underestimated the true capabilities of smart phones, as demonstrated in this experiment.
Regarding the CRT remote screen hack, yes that's well known, but CRTs use something on the order of 20,000 volts so of course that high a voltage is bound to create a robust electromagnetic signature which is easy to pick up at a distance if it's not shielded and usually it's not. I haven't really looked into whether or not the same type of CRT hack can be used on LCD screens, but I can say that LCDs don't use 20,000 volts so the external EM signature is not as strong, meaning if the same hack can be done, you'd probably need to be a lot closer to the LCD screen? Maybe I'll look into this when I have time.