TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis

344 pointsby longwaveover 11 years ago

23 comments

wrongc0ntinentover 11 years ago
The single coolest thing in the paper (other than Shamir's name): "On many laptops (e.g., most Lenovo ThinkPad models), the chassis potential can be easily reached by a human hand, through metal connectors and conductive coating on metal surfaces. Thus, an attacker can measure the chassis potential by merely touching the laptop chassis with his hand. Surreptitiously, the attacker can simultaneously measure his own body potential relative to the room’s ground potential, e.g., by having a concealed differential probe touching both his body and some nearby conductive grounded surface in the room. Perhaps surprisingly, even this circuitous measurement offers sufficient signal-to-noise ratio for the key extraction attack."
评论 #6928595 未加载
sillysaurus2over 11 years ago
Playing loud music when encrypting&#x2F;decrypting&#x2F;typing in your password will defend against acoustic attacks, right?<p>This other type of attack, however, isn&#x27;t so easily guarded against:<p><i>Beyond acoustics, we demonstrate that a similar low-bandwidth attack can be performed by measuring the electric potential of a computer chassis. A suitably-equipped attacker need merely touch the target computer with his bare hand, or get the required leakage information from the ground wires at the remote end of VGA, USB or Ethernet cables.</i><p>This serves as a reminder that it&#x27;s pretty much impossible to defend against an attacker that has physical access to your box.
评论 #6928354 未加载
评论 #6928759 未加载
评论 #6928498 未加载
评论 #6930781 未加载
评论 #6948558 未加载
评论 #6929809 未加载
评论 #6928999 未加载
评论 #6932496 未加载
r0mualdover 11 years ago
Important stuff:<p>&gt; Q9 How vulnerable is GnuPG now? We have disclosed our attack to GnuPG developers under CVE-2013-4576, suggested suitable countermeasures, and worked with the developers to test them. New versions of GnuPG 1.x and of libgcrypt (which underlies GnuPG 2.x), containing these countermeasures and resisting our current key-extraction attack, were released concurrently with the first public posting of these results. Some of the effects we found (including RSA key distinguishability) remain present.
kkenover 11 years ago
This is really impressive work. After skimming through the detailed paper it looks as if they are not picking up sound emitted from the CPU itself, but from the switching power supply circuit.<p>The frequency variation is caused by load differences. So they are in fact doing an indirect power analysis. A switching power supply will always change frequency as a reaction to variations in supply current, this is inherent to its design. I also believe that it will be very difficult to &quot;muffle&quot; all the inductors and capacitors as they are subjected to very high pulse loads. Magnetics will always find a way to emit sound...<p>It&#x27;s interesting to note that the biggest difference seems to be between register and memory instructions. This seems reasonable as memory instruction may, in the worst case, require powering the external bus, which is very power hungry. This will only get worse in future CPUs, as more and more clock gating is introduced.<p>So, I guess some countermeasures could be:<p>- If the CPU supports SMT or HT, load the other cores with a thread accessing random memory positions.<p>- Optimize the RSA code so that it&#x27;s memory access and runtime pattern does not depend on the key or clean text.<p>- Try to localize the RSA code as much as possible to reduce memory accesses. If memory access is required, do it all at once, for example by swapping entire cache pages.<p>Some of these are highly CPU dependent.
__alexsover 11 years ago
This is the patch they used to mitigate it afaict.<p><a href="http://git.gnupg.org/cgi-bin/gitweb.cgi?p=libgcrypt.git;a=commitdiff;h=dec048b2ec79271a2f4405be5b87b1e768b3f1a9" rel="nofollow">http:&#x2F;&#x2F;git.gnupg.org&#x2F;cgi-bin&#x2F;gitweb.cgi?p=libgcrypt.git;a=co...</a>
Sami_Lehtinenover 11 years ago
Nobody mentioned TEMPEST yet in this comment thread. It&#x27;s old (60s) but very interesting stuff. <a href="https://en.wikipedia.org/wiki/Tempest_%28codename%29" rel="nofollow">https:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Tempest_%28codename%29</a> It includes acoustical leaks as one side channel. Also see: <a href="http://www.nsa.gov/public_info/_files/cryptologic_spectrum/tempest.pdf" rel="nofollow">http:&#x2F;&#x2F;www.nsa.gov&#x2F;public_info&#x2F;_files&#x2F;cryptologic_spectrum&#x2F;t...</a> It&#x27;s cool that they were able to demonstrate it that well.
评论 #6931604 未加载
Lagged2Deathover 11 years ago
<i>Using multiple cores turns out to help the attack (by shifting down the signal frequencies).</i><p>I don&#x27;t understand how this would be, maybe because I don&#x27;t understand what they mean by &quot;using multiple cores.&quot;<p>You&#x27;d think that running a decoy thread on another core would mask things pretty effectively.
评论 #6932229 未加载
评论 #6931264 未加载
BrownBuffaloover 11 years ago
What&#x27;s interesting are old school spy acounstic methods. <a href="http://en.wikipedia.org/wiki/Laser_microphone" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Laser_microphone</a> &lt;-- great primer. This played out in micro surface vibration in a cup of coffee in the movie Eagle Eye (terrible movie btw). Either way, kind of a neat way to spy on embassy windows from a far w&#x2F;o even having to be in the room. A little off topic was the KGB&#x27;s bugging a government office with passive radio transmission - virtually undetectable <a href="http://en.wikipedia.org/wiki/Thing_(listening_device)" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Thing_(listening_device)</a> This stuff is so damn cool. :)
bhoustonover 11 years ago
Just to be clear, I believe this is from 2004.
评论 #6928394 未加载
cmansleyover 11 years ago
Random comment: Could similar attacks be used to extract the private key for Bitcoin accounts?
评论 #6932248 未加载
bsaulover 11 years ago
I&#x27;ve read the linked document, but this feels like magic to me. Is the general idea something like : i can hear the CPU is doing 10 additions, then 20 substractions, twenty times in a row, so i can tell by knowing the algorithm used that the CPU is computing a public key and that it must be between 1 billion and 1.5 billion ?
评论 #6933225 未加载
X4over 11 years ago
Without taking party, I am deeply impressed at an increasing rate and with honest respect to the ingenuity of the research that&#x27;s coming from Tel Aviv, Israel and from Switzerland. There is no other country except the USA which makes such leaps in technological progress. That&#x27;s my honest image of the research. I&#x27;m personally reading many of their publications and from various other journals too.
eyearequeover 11 years ago
If three academic types can come up with this, just imagine what the NSA or other foreign intelligence groups can find with a budget like they have.<p>Interesting for sure.
chromanoover 11 years ago
If that attack is available for us to know, I wonder what can possibly be happening inside NSA?<p>I even wonder how these big guys&#x2F;heroes like Julian and Snowden feel when they find out about it. I mean, maybe they just don&#x27;t care about the stuff they have being accessed without their consent, it is supposed to be released anyways, but what about their conversations that are supposed to be highly confidential?
abvdaskerover 11 years ago
When I started reading I thought this must be a joke. As a dev with what I like to think is a solid understanding of computer hardware I don&#x27;t often think of new tech as spooky&#x2F;sci-fi-esque, but this is so unbelievably cool. I have no words.
Sami_Lehtinenover 11 years ago
Fixed GnuPG 1.4.16 version released: <a href="http://lists.gnupg.org/pipermail/gnupg-announce/2013q4/000337.html" rel="nofollow">http:&#x2F;&#x2F;lists.gnupg.org&#x2F;pipermail&#x2F;gnupg-announce&#x2F;2013q4&#x2F;00033...</a>
artificialidiotover 11 years ago
A good enough solution might be using appliances designed with older cpus with little to no power management features but it is only practical for high stakes stuff like military comms I guess.
oakwhizover 11 years ago
Some motherboards have programmable&#x2F;adjustable VRMs. I wonder if the settings can be changed to mitigate the threat.
midas007over 11 years ago
I remember being able to hear a program run on an HP 32S (RPN) by placing it up to my ear, so this isn&#x27;t surprising.
gwu78over 11 years ago
What about computers located in the datacenter, next to other people&#x27;s computers?
jgalt212over 11 years ago
I really want to call B.S. on most of their claims, but I withhold any judgement until there is a live demo performed. Have they announced a timetable for a live demo?
评论 #6932093 未加载
afsinaover 11 years ago
This sounds like BS, smells like BS.. But then again he is Shamir.. Still I think it is BS
drakaalover 11 years ago
This is a really well written fake.<p>Use some common sense.<p>Are you only doing one thing on your computer? No.<p>Does your Memory vibrate when the data is stored? No.<p>Can data be transferred via acoustics over a 2 conductor 16 gauge wire at the speeds memory is accessed or is sent to the CPU? No.<p>Think of something you have heard &quot;hum&quot;. Is the noise pattern of your Amp and another the same if the &quot;hum is anything other than 60hz? No. Because manufacturing tolerances are not such that the flaws are the same.<p>This is really great FUD. Likely designed to get People to think that they are constantly at risk, and have the CIA and FBI spend billions buying acoustic shields for their computers.<p>If this is real. And does work, fine, just run a background task that puts multiple random RSA&#x27;s through the paces in alternate threads so the extraction can&#x27;t take place because of garbled data.<p>EDIT: Apparently I forgot that HackerNews You get downvoted if you present common sense in face of a fallacy that those with limited understanding want to hold true, as seen by the mass of links to wikipedia made by those with out the foggiest about audio, capacitance, RSA, or Electrical engineering.<p>-Brandon Wirtz SMPTE
评论 #6929407 未加载
评论 #6929207 未加载
评论 #6930117 未加载
评论 #6929277 未加载
评论 #6929399 未加载
评论 #6932515 未加载