{"id":25614,"date":"2014-08-21T05:42:59","date_gmt":"2014-08-21T09:42:59","guid":{"rendered":"http:\/\/www.opensource.im\/?p=25614"},"modified":"2014-08-21T05:42:59","modified_gmt":"2014-08-21T09:42:59","slug":"scientists-hack-cryptography-keys-by-simply-touching-a-laptop","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/cryptography\/scientists-hack-cryptography-keys-by-simply-touching-a-laptop.php","title":{"rendered":"Scientists Hack Cryptography Keys By Simply Touching a Laptop"},"content":{"rendered":"<p><p>    It sounds like something out of an    episode of Spooks: Researchers have discovered a way to    use simple touch to decode the cryptography keys that are    intended to secure your information. It's as easy as gauging    the electric potential coursing through your computer while    it's working.  <\/p>\n<p>    In the MIT Technology Review today, we learn of a    paper out of Tel Aviv University (title: Get    Your Hands Off My Laptop) that details the process of    measuring the ground electric potential in laptops. There are    several ways to do this: You could, say, use a wire. But that's    not nearly as exciting as using your own handpreferably    sweaty!and then \"analyzing that signal using sophisticated    software.\"  <\/p>\n<p>    Here's how the authors explain the process:  <\/p>\n<p>      This potential can be measured by a simple wire,      non-invasively touching a conductive part of the laptop (such      as the metal heatsink fins or shielding of USB, Ethernet,      VGA, DisplayPort and HDMI ports), and connected to a suitable      amplifier and digitizer. The chassis potential, thus      measured, is affected by ongoing computation, and our attacks      exploit this to extract RSA and ElGamal keys, within a few      seconds.    <\/p>\n<p>    According to the researchers, the hand method works \"is    especially effective in hot weather, since sweaty fingers offer    lower electric resistance.\"  <\/p>\n<p>    Essentially, they're taking advantage of the \"noise\" your    computer makes while it's processing this information, to    figure out exactly when and how they should listen in. Which    brings us to an important point: How to resist it. According to    MIT, it's \"possible to avoid such attacks by adding random data    to computations.\" In other words, we'll need to build codes on    top of code. [MIT Technology Review]  <\/p>\n<p>    Image: Lasse Kristensen.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gizmodo.com\/scientists-hack-cryptography-keys-by-simply-touching-a-1624641299\/RK=0\/RS=eQ.7U39J4bN1B91ch1oWUn9bieI-\" title=\"Scientists Hack Cryptography Keys By Simply Touching a Laptop\">Scientists Hack Cryptography Keys By Simply Touching a Laptop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> It sounds like something out of an episode of Spooks: Researchers have discovered a way to use simple touch to decode the cryptography keys that are intended to secure your information. It's as easy as gauging the electric potential coursing through your computer while it's working. In the MIT Technology Review today, we learn of a paper out of Tel Aviv University (title: Get Your Hands Off My Laptop) that details the process of measuring the ground electric potential in laptops<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1600],"tags":[],"class_list":["post-25614","post","type-post","status-publish","format-standard","hentry","category-cryptography"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25614"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=25614"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/25614\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=25614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=25614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=25614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}