{"id":25613,"date":"2014-08-20T14:43:52","date_gmt":"2014-08-20T18:43:52","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25613"},"modified":"2014-08-20T14:43:52","modified_gmt":"2014-08-20T18:43:52","slug":"how-to-break-cryptography-with-your-bare-hands","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/how-to-break-cryptography-with-your-bare-hands.php","title":{"rendered":"How to Break Cryptography With Your Bare Hands"},"content":{"rendered":"<p><p>    The latest way to snoop on a computer is by measuring subtle    changes in electrical potential as data is decrypted.  <\/p>\n<p>    Touch sensitive: In a demonstration, a researcher    captures cryptographic keys stored on a computer using a    sophisticated algorithm that measures ground potential    conducted through the skin.  <\/p>\n<p>    With enough technical savvy, simply touching a laptop can    suffice to extract the cryptographic keys used to secure data    stored on it.  <\/p>\n<p>    The trick is based on the fact that the ground electrical    potential in many computers fluctuates according to the    computation that is being performed by its processorincluding    the computations that take place when cryptographic software    operates to decrypt data using a secret key.  <\/p>\n<p>    Measuring the electrical potential leaked to your skin when you    touch the metal chassis of such laptops, and analyzing that    signal using sophisticated software, can be enough to determine    the keys stored within, says Eran Tromer, a computer security    expert at Tel Aviv University.  <\/p>\n<p>    The remarkable result is described in this paper due to be presented at a conference in South    Korea next month, but it was demonstrated Tuesday at a    cryptography conference in Santa Barbara, California.  <\/p>\n<p>    A signal can be picked up by touching exposed metal on a    computer chassis with a plain wire. Or that wire can make    contact anywhere on the body of an attacker touching the    computer with a bare hand (sweaty hands work best). The ground    signal can also be measured by fastening an alligator clip at    the far end of an Ethernet, VGA, or USB cable attached to the    computer, or even wirelessly with sensitive voltage-detection    equipment. The catch is that contact must be made as data is    unlocked with a keyduring decryption of a folder or an e-mail    message, for instance.  <\/p>\n<p>    Tromer says his research team has used all those methods to    extract encryption keys based on widely used, high-security    standards4,096-bit RSA keys and 3,072-bit ElGamal keys.  <\/p>\n<p>    The work contributes to a growing body of evidence that    regardless of the software protections people place on    computers, there are indirect ways to extract dataso-called    side channel attacks.  <\/p>\n<p>    Previous research efforts have found, for example, that    analyzing the power consumption of a computer can reveal    cryptographic keys. The good news is that analyzing subtle    trends in power usage can also reveal whether a computer is    being attacked (see Tiny    Changes in Energy Use Could Mean Your Computer Is Under    Attack).  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/news\/530251\/how-to-break-cryptography-with-your-bare-hands\" title=\"How to Break Cryptography With Your Bare Hands\">How to Break Cryptography With Your Bare Hands<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The latest way to snoop on a computer is by measuring subtle changes in electrical potential as data is decrypted. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25613","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25613"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25613"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25613\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}