Acoustic Cryptanalysis
Source: Schneier on Security - Posted by Dave Wreski   
Cryptography Here, we describe a new acoustic cryptanalysis key extraction attack, applicable to GnuPG's current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.

Read this full article at Schneier on Security

Only registered users can write comments.
Please login or register.

Powered by AkoComment!