ECDH Encrypted PC? watch out for electromagnetic waves

ECDH Key-Extraction: Israeli security researchers managed to collect encryption keys from a nearby computer by analyzing electromagnetic radiation.

The attack was carried out by IT scientists at the University of Tel Aviv and shows that TEMPEST side channel attacks are now a reality and not only at Mission Impossible.

Η study them has an ECDH Key-Extraction through Low-Bandwidth Electromagnetic Attacks on PCs, researchers and shows how decryption can be done in application keys using the libgcrypt11 library.wall-measurement ECDH

"We show that decryption keys can be extracted from computers running the ECDH encryption algorithm, using the electromagnetic emissions produced during the decryption process. By measuring the electromagnetic leakage of the target, the attack extracts the secret decryption key within a few , from a target located in an adjacent room even if a wall is in the way.”

The ECDH (elliptic curve Hellman) είναι ένας πρότυπος αλγόριθμος κρυπτογράφησης δημόσιου κλειδιού που χρησιμοποιείται στο OpenPGP, όπως ορίζεται στο RFC 6637 και NIST SP800-56A. Επιτεθήκαμε στον ECDH με βιβλιοθήκη libgcrypt 1.6.3 GnuPG (η τελευταία έκδοση τη στιγμή που εκδόθηκε η ). Η επίθεση ζητά την αποκρυπτογράφηση ενός ενιαίου και προσεκτικά επιλεγμένου ciphertext, και επαναλαμβάνεται μερικές δεκάδες φορές. Στη συνέχεια, χρησιμοποιεί τεχνικές ανάλυσης του σήματος χρόνου-συχνότητας, προκειμένου να εξάγει από την ηλεκτρομαγνητική διαρροή τον κωδικό αποκρυπτογράφησης από τις εκπομπές του φορητού υπολογιστή-στόχου κατά τη of the execution of the tel of the ECDH.

An antenna, amplifiers, software radio and a computer for analysis were used for the attack.

Researchers (Daniel Genkin, Lev Pachmanov, Itamar Pipman and Eran Tromer) will present their findings at the next RSA conference in San Francisco on 3 March.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).