TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Researchers crack the world’s toughest encryption

52 pointsby Aurel1usover 11 years ago

13 comments

tobiasuover 11 years ago
Can extremetech please be added to the list of websites blocked by default on HN.<p>There is never any original content from that site, it&#x27;s always rehashed crap, littered with buzzwords and reeking of the dead corpse of journalistic integrity.
rb2eover 11 years ago
Research paper is here: <a href="http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf" rel="nofollow">http:&#x2F;&#x2F;www.tau.ac.il&#x2F;~tromer&#x2F;papers&#x2F;acoustic-20131218.pdf</a><p>Edited to add: This is one hell of a hack.
kkenover 11 years ago
Meh, sensationalist title.<p>Already commented on the first submission: <a href="https://news.ycombinator.com/item?id=6933678" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6933678</a>
onion2kover 11 years ago
Being <i>hugely</i> pedantic, the &quot;world&#x27;s toughest encryption&quot; is a one-time pad, and they didn&#x27;t crack that.
评论 #6933737 未加载
nmcover 11 years ago
Previous discussion on HN (270 points | 89 comments)<p>(Notably about why playing music does not mitigate the threat.)<p><a href="https://news.ycombinator.com/item?id=6927905" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6927905</a>
exo762over 11 years ago
There is a patch for that in GnuPG, available in both Debian and Ubuntu. Update your machines :)<p>FLOSS is amazing. One day since research paper and your machines are already patched. This means that probably no one had enough time to actually use this attack vector in the wild.
评论 #6934738 未加载
dazamover 11 years ago
This is possible because of the electromagnetic signature generated by the processor&#x27;s clock circuit while it is decrypting the data. The microphone is listening to the EM signal generated by the clock and timing the samples to reconstruct what the processor was doing. This type of attack is very difficult to carry out against a completely asynchronous or self-timed circuit that doesn&#x27;t generate timed samples due to the lack of any central clock.
gfodorover 11 years ago
these people, to me, are indistinguishable from wizards.
drblastover 11 years ago
<p><pre><code> &gt;or you need to use a “sufficiently strong wide-band noise &gt;source.” Something like a swooping, large-orchestra &gt;classical concerto would probably do it. </code></pre> Unless you&#x27;re standing next to a live orchestra that&#x27;s playing the concerto on specially designed dog-whistles, you&#x27;re going to have a pretty hard time masking anything near the 150 kHz range.
androver 11 years ago
Perhaps this can be thwarted by adding randomization to algorithm implementations so calculations are performed in different order every time.
评论 #6933710 未加载
Tepixover 11 years ago
So, would running something else on the same CPU (getting the load to 100%) mitigate this issue?
ozhover 11 years ago
TL;DR: Paranoid? Turn on Metallica up to eleven when decrypting data
lucb1eover 11 years ago
s&#x2F;crack&#x2F;bypassed&#x2F;
评论 #6933758 未加载