University of Cambridge > Talks.cam > Computer Laboratory Security Group meeting presentations > Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs

Who by sound and who by ground, who by pin and who by skin: side-channel key extraction from PCs

Add to your list(s) Download to your calendar using vCal

If you have a question about this talk, please contact Markus Kuhn.

Can secret information be extracted from personal computers by measuring their physical properties from the outside? What would it take to extract whole keys from such fast and complex devices? We present myriads way to do so, by analyzing signals acquired through microphones, antennas, paper clips, or even the touch of a human hand. The talk will discuss the attacks’ principles.

For example, many computers emit a high-pitched noise during operation, due to vibration of electronic components. These acoustic emanations, we show, can be exploited to extract 4096-bit RSA secret keys from the popular GnuPG software, within an hour—just by pointing a microphone at the computer while it is decrypting carefully-crafted ciphertexts.

Additional attacks are based on the observation that the “ground” electric potential, in many computers, fluctuates in a computation-dependent way. An attacker can measure this signal by touching the computer’s chassis, or the shield on the remote end of Ethernet, VGA or USB cables. Secret keys can then be extracted, sometimes within seconds.

Joint works with Daniel Genkin, Itamar Pipman and Adi Shamir. For further information on the acoustic key extraction, see http://www.cs.tau.ac.il/~tromer/acoustic .

This talk is part of the Computer Laboratory Security Group meeting presentations series.

Tell a friend about this talk:

This talk is included in these lists:

Note that ex-directory lists are not shown.

 

© 2006-2019 Talks.cam, University of Cambridge. Contact Us | Help and Documentation | Privacy and Publicity