Enric Lleal Serra wrote to All <=-
Hola All!
Curioso, tras descubrir hace años el phreaking Van Eck[1], leo en el
blog de Schneier[2] sobre la aplicación práctica y a un coste asequible de la evolución de ese concepto, ahora con el nombre molón y mediático
de TEMPEST.
Lo he entendido bien? Se trata de "capturar" la impresion en pantalla
CRT?
To test the hack, the researchers first sent the target a specific ciphertext -- in other words, an encrypted message.
"During the decryption of the chosen ciphertext, we measure the EM
leakage of the target laptop, focusing on a narrow frequency band," the
paper reads. The signal is then processed, and "a clean trace is produced which reveals information about the operands used in the elliptic curve cryptography," it continues, which in turn "is used in order to reveal
the secret key."
The equipment used included an antenna, amplifiers, a software-defined radio, and a laptop. This process was being carried out through a 15cm
thick wall, reinforced with metal studs, according to the paper.
The researchers obtained the secret key after observing 66 decryption processes, each lasting around 0.05 seconds. "This yields a total
measurement time of about 3.3 sec," the paper reads. It's important to
note that when the researchers say that the secret key was obtained in "seconds," that's the total measurement time, and not necessarily how
long it would take for the attack to actually be carried out. A real
world attacker would still need to factor in other things, such as the
target reliably decrypting the sent ciphertext, because observing that process is naturally required for the attack to be successful.
Si es asi, joder...
Sysop: | Karloch |
---|---|
Location: | Madrid, Spain |
Users: | 74 |
Nodes: | 8 (0 / 8) |
Uptime: | 27:34:11 |
Calls: | 1,495 |
Files: | 17,895 |
Messages: | 65,841 |