In RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis [PDF], a paper by Daniel Genkin and Eran Tromer of Tel Aviv University and Adi Shamir, the authors show that a sensitive microphone (such as the one in a compromised mobile phone) can be used to infer a secret cryptographic key being used by a nearby computer. The computer's processor emits different quiet sounds ("coil whine...caused by voltage regulation circuits") as it performs cryptographic operations, and these sounds, properly analyzed, can reveal the key.
It's a pretty stunning attack, the sort of thing that sounds like science fiction. But the researchers are unimpeachable (Shamir is the "S" in RSA), and their paper is very clear.
The techniques they demonstrated certainly aren't viable for casual attacks. Still, as Wednesday's updates from GnuPG attest, they represent a realistic threat for people who use cryptographic software and devices in certain settings. The researchers outline several countermeasures application developers can implement to prevent computers from leaking the secret keys in acoustic emanations, namely a technique known as RSA ciphertext randomization. People who rely on cryptography applications should check with the developers to make sure they're not susceptible. In the meantime, end users shouldn't assume that running a computer in a noisy environment will prevent attacks from working, since acoustic emanations that leak secret keys can often be filtered.
New attack steals e-mail decryption keys by capturing computer sounds [Dan Goodin/Ars Technica]
By the end of the year, Trump and his family will have spent more of the Secret Service’s budget than the Obama administration spent in eight years — enough to exhaust the Secret Service’s entire budget for the year and drive 500 Secret Security agents to quit their jobs in disgust.
This week at Singapore’s Hack in the Box conference, researchers Lucas Apa and Cesar Cerrudo from the Argentinian security research company IOActive will present their findings on the defects in humanoid domestic robots from UBTech and Softbank and industrial robot arms from Universal Robots; they’re building on research published in March in which they released […]
On the one hand, if you let an untrusted stranger install hardware in your electronic device, you’re opening yourself up to all kinds of potential mischief; on the other hand, an estimated one in five smartphones has a cracked screen and the easiest, most efficient and cheapest way to get that fixed is to go […]
Top-performing content doesn’t come from pure inspiration. So how do you get the maximum number of eyeballs to see your marketing copy? By analyzing the impact of the keywords within. Serpstat does this all for you. It can monitor up to 200 keywords in your projects, across 10 total domains. They keep track of the […]
Toaster ovens are the perfect appliance for small things like toasted sandwiches and roasted garlic (try it!), but anything more involved usually requires a full-sized conventional oven.However, despite its small size, the Wolfgang Puck Pressure Oven can handle anything from baked pastries to broiled meats. This kitchen appliance has a minimal countertop footprint, and cooks […]