TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Researchers crack the world’s toughest encryption

52 点作者 Aurel1us超过 11 年前

13 条评论

tobiasu超过 11 年前
Can extremetech please be added to the list of websites blocked by default on HN.<p>There is never any original content from that site, it&#x27;s always rehashed crap, littered with buzzwords and reeking of the dead corpse of journalistic integrity.
rb2e超过 11 年前
Research paper is here: <a href="http://www.tau.ac.il/~tromer/papers/acoustic-20131218.pdf" rel="nofollow">http:&#x2F;&#x2F;www.tau.ac.il&#x2F;~tromer&#x2F;papers&#x2F;acoustic-20131218.pdf</a><p>Edited to add: This is one hell of a hack.
kken超过 11 年前
Meh, sensationalist title.<p>Already commented on the first submission: <a href="https://news.ycombinator.com/item?id=6933678" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6933678</a>
onion2k超过 11 年前
Being <i>hugely</i> pedantic, the &quot;world&#x27;s toughest encryption&quot; is a one-time pad, and they didn&#x27;t crack that.
评论 #6933737 未加载
nmc超过 11 年前
Previous discussion on HN (270 points | 89 comments)<p>(Notably about why playing music does not mitigate the threat.)<p><a href="https://news.ycombinator.com/item?id=6927905" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=6927905</a>
exo762超过 11 年前
There is a patch for that in GnuPG, available in both Debian and Ubuntu. Update your machines :)<p>FLOSS is amazing. One day since research paper and your machines are already patched. This means that probably no one had enough time to actually use this attack vector in the wild.
评论 #6934738 未加载
dazam超过 11 年前
This is possible because of the electromagnetic signature generated by the processor&#x27;s clock circuit while it is decrypting the data. The microphone is listening to the EM signal generated by the clock and timing the samples to reconstruct what the processor was doing. This type of attack is very difficult to carry out against a completely asynchronous or self-timed circuit that doesn&#x27;t generate timed samples due to the lack of any central clock.
gfodor超过 11 年前
these people, to me, are indistinguishable from wizards.
drblast超过 11 年前
<p><pre><code> &gt;or you need to use a “sufficiently strong wide-band noise &gt;source.” Something like a swooping, large-orchestra &gt;classical concerto would probably do it. </code></pre> Unless you&#x27;re standing next to a live orchestra that&#x27;s playing the concerto on specially designed dog-whistles, you&#x27;re going to have a pretty hard time masking anything near the 150 kHz range.
andr超过 11 年前
Perhaps this can be thwarted by adding randomization to algorithm implementations so calculations are performed in different order every time.
评论 #6933710 未加载
Tepix超过 11 年前
So, would running something else on the same CPU (getting the load to 100%) mitigate this issue?
ozh超过 11 年前
TL;DR: Paranoid? Turn on Metallica up to eleven when decrypting data
lucb1e超过 11 年前
s&#x2F;crack&#x2F;bypassed&#x2F;
评论 #6933758 未加载