Scientists Hack Cryptography Keys By Simply Touching a Laptop

It sounds like something out of an episode of Spooks: Researchers have discovered a way to use simple touch to decode the cryptography keys that are intended to secure your information. It's as easy as gauging the electric potential coursing through your computer while it's working.

In the MIT Technology Review today, we learn of a paper out of Tel Aviv University (title: Get Your Hands Off My Laptop) that details the process of measuring the ground electric potential in laptops. There are several ways to do this: You could, say, use a wire. But that's not nearly as exciting as using your own handpreferably sweaty!and then "analyzing that signal using sophisticated software."

Here's how the authors explain the process:

This potential can be measured by a simple wire, non-invasively touching a conductive part of the laptop (such as the metal heatsink fins or shielding of USB, Ethernet, VGA, DisplayPort and HDMI ports), and connected to a suitable amplifier and digitizer. The chassis potential, thus measured, is affected by ongoing computation, and our attacks exploit this to extract RSA and ElGamal keys, within a few seconds.

According to the researchers, the hand method works "is especially effective in hot weather, since sweaty fingers offer lower electric resistance."

Essentially, they're taking advantage of the "noise" your computer makes while it's processing this information, to figure out exactly when and how they should listen in. Which brings us to an important point: How to resist it. According to MIT, it's "possible to avoid such attacks by adding random data to computations." In other words, we'll need to build codes on top of code. [MIT Technology Review]

Image: Lasse Kristensen.

Read this article:
Scientists Hack Cryptography Keys By Simply Touching a Laptop

How to Break Cryptography With Your Bare Hands

The latest way to snoop on a computer is by measuring subtle changes in electrical potential as data is decrypted.

Touch sensitive: In a demonstration, a researcher captures cryptographic keys stored on a computer using a sophisticated algorithm that measures ground potential conducted through the skin.

With enough technical savvy, simply touching a laptop can suffice to extract the cryptographic keys used to secure data stored on it.

The trick is based on the fact that the ground electrical potential in many computers fluctuates according to the computation that is being performed by its processorincluding the computations that take place when cryptographic software operates to decrypt data using a secret key.

Measuring the electrical potential leaked to your skin when you touch the metal chassis of such laptops, and analyzing that signal using sophisticated software, can be enough to determine the keys stored within, says Eran Tromer, a computer security expert at Tel Aviv University.

The remarkable result is described in this paper due to be presented at a conference in South Korea next month, but it was demonstrated Tuesday at a cryptography conference in Santa Barbara, California.

A signal can be picked up by touching exposed metal on a computer chassis with a plain wire. Or that wire can make contact anywhere on the body of an attacker touching the computer with a bare hand (sweaty hands work best). The ground signal can also be measured by fastening an alligator clip at the far end of an Ethernet, VGA, or USB cable attached to the computer, or even wirelessly with sensitive voltage-detection equipment. The catch is that contact must be made as data is unlocked with a keyduring decryption of a folder or an e-mail message, for instance.

Tromer says his research team has used all those methods to extract encryption keys based on widely used, high-security standards4,096-bit RSA keys and 3,072-bit ElGamal keys.

The work contributes to a growing body of evidence that regardless of the software protections people place on computers, there are indirect ways to extract dataso-called side channel attacks.

Previous research efforts have found, for example, that analyzing the power consumption of a computer can reveal cryptographic keys. The good news is that analyzing subtle trends in power usage can also reveal whether a computer is being attacked (see Tiny Changes in Energy Use Could Mean Your Computer Is Under Attack).

The rest is here:
How to Break Cryptography With Your Bare Hands

The Next Battleground In The War Against Quantum Hacking

Ever since the first hack of a commercial quantum cryptography device, security specialists have been fighting back. Heres an update on the battle.

Quantum hacking is the latest fear in the world of information security. Not so long ago, physicists were claiming that they could send information with perfect security using a technique known as quantum key distribution.

This uses the laws of quantum mechanics to guarantee perfectly secure communication. And perfectly secure communication is what you get, at least in theory.

The trouble is that in practice the equipment used to carry out quantum key distribution has a number of weaknesses that an eavesdropper can exploit to gain information about the messages being sent. Various groups have demonstrated how quantum hacking presents a real threat to perfectly secure communication.

So in the cat and mouse game of information security, physicists have been fighting back by designing equipment that is more secure. Today, Nitin Jain at the Max Planck Institute for the Science of Light in Erlangen, Germany, and a few pals show how the changes still leave the equipment open to attack but at the same time reveal how the next generation of quantum cryptography could be made better.

In quantum key distribution, Alice sends information to Bob encoded in the polarisation of single photons. So she might send a sequence of 0s and 1s as a series of photons polarised horizontally and vertically. Bob can then use this information as the key to a one-time pad for sending information with perfect security. Hence the name quantum key distribution.

An eavesdropper, Eve, can only see the information Alice sends if she knows the directions that correspond to vertical and horizontal. Physicists call this the base of the system.

Without knowing the base, the information the photons carry will seem random. So a key part of the security of quantum key distribution comes from keeping Alices base secret.

Just over 10 years ago, hackers found a way for Eve to discover Alices base. All Eve has to do is shine a light into Alices equipment and measure the polarisation of the reflected photons. These will have bounced off the optical components that determine Alices base and so will be polarised in the same way. That gives Eve the crucial information she needs to decode the transmissions without Alice being any the wiser.

View post:
The Next Battleground In The War Against Quantum Hacking

Technology Can Make Lawful Surveillance Both Open and Effective

With cryptography, surveillance processes could be open and preserve privacy without undermining their investigative power.

Democracy rests on the principle that legal processes must be open and public. Laws are created through open deliberation by elected bodies; they are open for anyone to read or challenge; and in enforcing them the government must get a warrant before searching a persons private property. For our increasingly electronic society to remain democratic, this principle of open process must follow us into cyberspace. Unfortunately it appears to have been lost in translation.

The NSA, secretly formed after World War II to spy on wartime adversaries, has clung to military-grade secrecy while turning its signals-intelligence weapons on ourselves and our allies. While nominally still a foreign-intelligence agency, the NSA has become a de facto law-enforcement agency by collecting bulk surveillance data within the U.S. and feeding these data to law-enforcement agencies. What walks like a duck and squawks like a duck is usually a duck, and since the NSA has been squawking like a law-enforcement agency, it should be subject to open processes like a law-enforcement agency.

Other agencies have also caught secret surveillance fever. Arguing that phone or Internet users have no expectation of privacy, the FBI secretly uses warrantless subpoenas to obtain bulk cell-tower records affecting hundreds of thousands of users at once, whether investigating bank robberies or harmless urban pranks. Police spy on entire neighborhoods with fake cellular base stations known as StingRays and have deliberately obfuscated warrants to conceal their use of the technology.

All this secrecyand its recent partial unravelinghas harmed our democracy and our economy. But effective surveillance does not require total secrecy. With a policy and technology framework that our team and others have developed, surveillance processes could be made open and privacy-preserving without compromising their effectiveness. Details will be presented today in our paper Catching Bandits and Only Bandits at the Workshop on Free and Open Communications on the Internet.

We propose an openness principlesomethingwe believe is necessary to constrain electronic surveillance in a healthy democracy. In brief, any surveillance process that collects or handles bulk data or metadata about users not specifically targeted by a warrant must be subject to public review and should use strong encryption to safeguard the privacy of innocent users. Only after law-enforcement agencies identify people whose actions justify closer investigation and demonstrate probable cause via an authorized electronic warrant can they gain access to unencrypted surveillance data or employ secret analysis processes. The details of an investigation need not be public, but the data collection process would bewhat information was collected, from whom, and how it was encrypted, stored, searched, and decrypted. This is no different in principle from the way the police traditionally use an open process to obtain physical search warrants without publicly revealing the target or details of their investigation.

Technology we have developed could allow law enforcement to enact this approach without hampering their work. In fact it could even enhance it. As we have argued before and have now demonstrated, modern cryptography could enable agencies to find and surgically extract warrant-authorized data about persons of interest like needles in a haystack of encrypted data, while guarding both the secrecy of the investigation and the privacy of innocent users whose data comprise the haystack. The NSA was aware of this option but, shielded from public scrutiny, chose a more invasive path. Our design ensures that no sensitive data may be decrypted without the use of multiple keys held by independent authorities, such as the law-enforcement agency, the authorizing judge, and a legislative oversight body.

Our approach can target not just known but unknown users. In the case of bank robbers known as the High Country Bandits, the FBI intercepted cell-tower records of 150,000 people to find one criminal who had carried a cell phone to three robbery sites. Using our encrypted metadata search system, the FBI could have quickly extracted the bandits number without obtaining data on about 149,999 innocent bystanders. The same system could discover unknown associates of known targets. This and many other cryptographic methods could facilitate the legitimate pursuit of criminals and terrorists while protecting our privacy.

Secrecy-obsessed agencies will fret that open processes like those we propose might help terrorists evade surveillance. But its better to risk a few criminals being slightly better informed than to risk the privacy and trust of everyone. When intelligence leaders lie to Congress and spy on their overseers, we must ask whether the existential threat to our society is hiding in rocky caves or in Beltway offices. With the right technology, we can have both strong national security and strong privacy.

Bryan Ford is an associate professor of computer science at Yale University, where he leads the Decentralized/Distributed Systems research group.

Continued here:
Technology Can Make Lawful Surveillance Both Open and Effective

BlackBerry forms new business unit

;

BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

WATERLOO, Ont. BlackBerry Ltd. has created a new business unit that will combine some of its most innovative technology, including QNX embedded software, Certicom cryptography applications and its patent portfolio.

The unit, to be called BlackBerry Technology Solutions, will be headed by Sandeep Chennakeshu, who has previously been president of Ericsson Mobile Platforms and chief technology officer of Sony-Ericsson.

Combining all these assets into a single business unit led by Sandeep will create operational synergies and new revenue streams, furthering our turnaround strategy, said John Chen, BlackBerrys executive chairman and chief executive officer.

QNX is a formerly independent Ottawa-based company with software used by the automotive industry for information-entertainment systems. Certicom was a formerly independent Toronto-area company that has advanced security software.

BTS will also include BlackBerrys Project Ion, which is an application platform focused on machine-to-machine Internet technology, Paratek antenna tuning technology and about 44,000 patents.

Chennakeshu has 25 years of experience in research, product development, and intellectual property licensing in the wireless, electronics and semiconductor industries. He has 73 patents to his name.

The Canadian Press, 2014

See more here:
BlackBerry forms new business unit

System-on-Chip suits smart metering applications.

August 14, 2014 - Built on dual-core 32-bit ARM Cortex-M4 architecture, Model SAM4CP16B is fully compatible with ATPL230A OFDM physical layer device which is compliant with PRIME standard specification. Chip meets OEM requirements by incorporating independent application, protocol stack, and physical layer processing functions within same device. Features include integrated low-power driver, advanced cryptography, 1 MB embedded Flash, 152 KB of SRAM, low-power RTC, and LCD controller. Atmel Corp. 2325 Orchard Parkway San Jose, CA, 95131 USA Press release date: August 12, 2014

Dual-Core Architecture, Integration and Extensive Security Features Ideal for Smart Metering

SAN JOSE, Calif., -- Atmel( )Corporation (NASDAQ: ATML), a global leader in microcontroller and touch technology solutions, today announced the introduction of its latest Power Line Communication System-on-Chip (SoC) solution designed for smart metering applications.

The Atmel SAM4CP16B is an extension of Atmel's SAM4Cx smart energy platform built on a dual-core 32-bit ARM Cortex-M4 architecture. Fully compatible with Atmel's ATPL230A OFDM physical layer (PHY) device compliant with PRIME standard specification, this highly flexible solution addresses OEM's requirements for various system partitioning, BOM reduction and time-to-market requirements by incorporating independent application, protocol stack and physical layer processing functions within the same device.

"We continue to build on the success of our industry leading SAM4Cx platform and offer best-in-class embedded connectivity, flexibility and cost structure for high-volume smart metering deployments," said Andres Munoz, marketing manager, smart energy communications at Atmel Corporation. "Furthermore, additional enhancements developed to meet PRIME standard specifications provide unprecedented performance in rigorous environments."

Key features of the solution include integrated low-power driver, advanced cryptography, 1Mbytes of embedded Flash, 152Kbytes of SRAM, low-power RTC, and LCD controller.

Availability For more information on availability and pricing, please contact your local Atmel sales representative.

More Information Atmel's SAM4Cx Platform: http://www.atmel.com/products/smart-energy/default.aspx Atmel ARM-based products: http://www.atmel.com/arm/default.aspx Atmel YouTube Channel: http://www.atmel.com/youtube Embedded Design Blog: http://www.atmelcorporation.wordpress.com Twitter: http://www.atmel.com/twitter LinkedIn: http://www.atmel.com/linkedin Facebook: http://www.atmel.com/facebook

About Atmel Atmel Corporation (NASDAQ: ATML) is a worldwide leader in the design and manufacture of microcontrollers, capacitive touch solutions, advanced logic, mixed-signal, nonvolatile memory and radio frequency (RF) components. Leveraging one of the industry's broadest intellectual property (IP) technology portfolios, Atmel is able to provide the electronics industry with complete system solutions focused on industrial, consumer, communications, computing and automotive markets.

2014 Atmel Corporation. Atmel, Atmel logo and combinations thereof, Enabling Unlimited Possibilities, and others are registered trademarks or trademarks of Atmel Corporation in U.S. and other countries. Other terms and product names may be trademarks of others.

Read more:
System-on-Chip suits smart metering applications.

Clever Workaround: Visual Cryptography On Austrian Postage Stamps

An anonymous reader writes Have you heard of personalized postage stamps? You pay the value of the stamps plus a fee and the post office prints official stamps usable for postage which show (almost) anything you can put into a jpeg file. An Austrian Tibet supporter found out what 'almost' means. He submitted a picture of the Dalai Lama with the text 'His Holiness the Dalai Lama,' but the Austrian post office refused to produce these stamps. Stampnews and the Neue Zuercher Zeitung (autotranslation) reported that this had been due to pressure from the Chinese embassy in Vienna. Now there is a video showing how visual cryptography has been used to get around this attempt at censorship [caution: organ music] .

Read the original:
Clever Workaround: Visual Cryptography On Austrian Postage Stamps