BreachExchange mailing list archives

Ambient Computer Noise Leaks Your Encryption Keys


From: "Network IPdog" <network.ipdog () gmail com>
Date: Fri, 20 Dec 2013 10:45:47 -0800

http://hackaday.com/2013/12/20/ambient-computer-noise-leaks-your-encryption-
keys/ 

http://www.cs.tau.ac.il/~tromer/acoustic/

Students at Tel Aviv University have successfully extracted 4096-bit RSA
encryption keys using only the sound produced by the target computer. 

It may sound a bit like magic, but this is a real attack - although it's
practicality may be questionable. 

The group first described this attack vector at Eurocrypt 2004. 

The sound used to decode the encryption keys is produced not by the
processor itself, but by the processor's power supply, mainly the capacitors
and coils.

 

 

Ruff, Ruff...!

 

Network IPdog

 

Ephesians 4:32  &  Cheers!!!

 

A password is like a... toothbrush  ;^) 

Choose a good one, change it regularly and don't share it.

 

 

_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss
For inquiries regarding use or licensing of data, e-mail
        sales () riskbasedsecurity com 

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security offers security intelligence, risk management services and customized security solutions. The 
YourCISO portal gives decision makers access to tools for evaluating their security posture and prioritizing risk 
mitigation strategies. Cyber Risk Analytics offers actionable threat information and breach analysis.

Current thread: