Date: 20/12/2013 16:17:26
From: Dropbear
ID: 453905
Subject: 4096 bit RSA key descripted by acoustic crytponalysis

“In their research paper titled RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Daniel Genkin, Adi Shamir and Eran Tromer et al. present a method for extracting decryption keys from the GnuPG security suite using an interesting side-channel attack. By analysing the acoustic sound made by the CPU they were able to extract a 4096-bit RSA key in about an hour (PDF). A modern mobile phone placed next to the computer is sufficient to carry out the attack, but up to four meters have been successfully tested using specially designed microphones.”

http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf

This is freaky shit

Reply Quote

Date: 20/12/2013 16:22:51
From: transition
ID: 453906
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

>This is freaky shit

On a related subject my old computer rolled the clock, on the bus I think (appeared to have some sort of setting for something like that described) was reading in the info sheet oneday, is that to make it more difficult to read the RF coming out of it, or is it purely to stop interference or something (if I am recalling correctly).

Reply Quote

Date: 20/12/2013 16:22:57
From: PermeateFree
ID: 453907
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Dropbear said:


“In their research paper titled RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Daniel Genkin, Adi Shamir and Eran Tromer et al. present a method for extracting decryption keys from the GnuPG security suite using an interesting side-channel attack. By analysing the acoustic sound made by the CPU they were able to extract a 4096-bit RSA key in about an hour (PDF). A modern mobile phone placed next to the computer is sufficient to carry out the attack, but up to four meters have been successfully tested using specially designed microphones.”

http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf

This is freaky shit

So where are you going to keep your porn now?

Reply Quote

Date: 20/12/2013 16:23:52
From: Dropbear
ID: 453908
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

PermeateFree said:


Dropbear said:

“In their research paper titled RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Daniel Genkin, Adi Shamir and Eran Tromer et al. present a method for extracting decryption keys from the GnuPG security suite using an interesting side-channel attack. By analysing the acoustic sound made by the CPU they were able to extract a 4096-bit RSA key in about an hour (PDF). A modern mobile phone placed next to the computer is sufficient to carry out the attack, but up to four meters have been successfully tested using specially designed microphones.”

http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf

This is freaky shit

So where are you going to keep your porn now?

Your mum sends me a fresh batch weekly.

Reply Quote

Date: 20/12/2013 16:24:50
From: PermeateFree
ID: 453910
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Dropbear said:


PermeateFree said:

Dropbear said:

“In their research paper titled RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis, Daniel Genkin, Adi Shamir and Eran Tromer et al. present a method for extracting decryption keys from the GnuPG security suite using an interesting side-channel attack. By analysing the acoustic sound made by the CPU they were able to extract a 4096-bit RSA key in about an hour (PDF). A modern mobile phone placed next to the computer is sufficient to carry out the attack, but up to four meters have been successfully tested using specially designed microphones.”

http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf

This is freaky shit

So where are you going to keep your porn now?

Your mum sends me a fresh batch weekly.

You into spiritualism too?

Reply Quote

Date: 20/12/2013 16:26:42
From: transition
ID: 453911
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Yeah spread spectrum clocking to stop EMI was what was on about. All clear now.

Reply Quote

Date: 20/12/2013 16:31:41
From: Spiny Norman
ID: 453912
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

But is is true?
Bloody amazing if it is.

Reply Quote

Date: 20/12/2013 16:32:30
From: transition
ID: 453913
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Some history re spread spectrum (hopping etc)

http://en.wikipedia.org/wiki/Spread_spectrum

On March 17, 1903, Nicola Tesla was granted a patent for a system of frequency hopping between two or more channels to prevent communications being blocked. In 1908 Jonathan Zenneck wrote Wireless Telegraphy, which expanded on this concept. Starting in 1915, Zenneck’s system was used by Germany to secure battle field communications.

Avant garde composer George Antheil and Golden Age actress Hedy Lamarr were granted US Patent 2,292,387 on August 11, 1942 for their Secret Communication System for use in radio guided torpedoes. Their approach was unique in that frequency coordination was done with paper player piano rolls – a novel approach which was never put in practice

Reply Quote

Date: 20/12/2013 16:33:42
From: poikilotherm
ID: 453914
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

http://arstechnica.com/security/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/

Reply Quote

Date: 20/12/2013 16:42:13
From: fsm
ID: 453918
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Back in the bad old days, the TX and RX lights of many modems were connected to – and flickered in sync with – the data lines and so the info could be read from outside a building if you could get a view of the modem lights.

Reply Quote

Date: 20/12/2013 17:50:18
From: Witty Rejoinder
ID: 453964
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

This is equally freaky:

Computer scientists from Germany have developed a new form of malware that can transmit data from hacked computers using an audio signal inaudible to humans.

Just using the built-in speakers and microphone in a pair of commercially available laptops, the researchers were able to transfer small amounts of sensitive data across a distance of almost 65 feet.

The team involved also predicted that this distance could be increased significantly using a network of controlled devices to relay the data acoustically.

The discovery is of particular relevance to high-security computer networks where sensitive data is often protected with an “air gap”, meaning that the devices are physically disconnected from any networks, including the internet.

http://www.independent.co.uk/life-style/gadgets-and-tech/scientists-create-computer-virus-that-transfers-stolen-data-using-inaudible-sounds-8980674.html

Reply Quote

Date: 20/12/2013 20:38:26
From: CrazyNeutrino
ID: 454082
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

it sounds similar to using incandescent light bulbs as microphones

Ive never tried it, does anyone know it that works?

Reply Quote

Date: 20/12/2013 20:40:36
From: Michael V
ID: 454085
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

CrazyNeutrino said:

it sounds similar to using incandescent light bulbs as microphones

Ive never tried it, does anyone know it that works?

Maybe, but that person’s not me.

Reply Quote

Date: 20/12/2013 20:42:19
From: Wocky
ID: 454088
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

CrazyNeutrino said:

it sounds similar to using incandescent light bulbs as microphones

Ive never tried it, does anyone know it that works?

Never tried incandescent lights, but I have used the sun and lasers. Incandescent lights would probably work.

Reply Quote

Date: 23/12/2013 14:29:17
From: mollwollfumble
ID: 456400
Subject: re: 4096 bit RSA key descripted by acoustic crytponalysis

Have read the paper now. It appears genuine. Though it requires the decrypter to control exactly what the target computer is encrypting.

Reply Quote