{"id":32307,"date":"2017-06-26T12:41:13","date_gmt":"2017-06-26T16:41:13","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/aes-256-encryption-keys-cracked-by-hands-off-hack-the-inquirer.php"},"modified":"2017-06-26T12:41:13","modified_gmt":"2017-06-26T16:41:13","slug":"aes-256-encryption-keys-cracked-by-hands-off-hack-the-inquirer","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/aes-256-encryption-keys-cracked-by-hands-off-hack-the-inquirer.php","title":{"rendered":"AES-256 encryption keys cracked by hands-off hack &#8211; The INQUIRER"},"content":{"rendered":"<p><p>    SOME DUTCH RESEARCHERS have discovered a way    of cracking AES-256 encryption using reasonably cheap gear and    wireless tech.  <\/p>\n<p>    Fox-IT, which is the Dutch company, calls the attack 'Tempest'    and explains that it is enabled through proximity and relies on    the monitoring of electromagnetic signals in what is known as a    side channel attack.  <\/p>\n<p>    Researchers put together a piece of kit worth less than $200    and were able to wirelessly extract secret AES-256 encryption    keys from a distance of one metre. They said that the attack    can be carried out by people on all budgets and with all kinds    of means.  <\/p>\n<p>    \"The recording hardware can range from extremely high-end radio    equipment, down to 20 USB SDRs. We have found that even the    cheap USB dongles can be used to attack software    implementations!\" they said. \"This is not a game    exclusively for nation states, but also anyone with pocket    money and some free time (PDF).\"  <\/p>\n<p>    Usually, such an attack would require direct access and    manipulation, but Fox-IT found that it was possible just to    swan past the target with a bag of wires and small screws and    catch a winner in record time.  <\/p>\n<p>    \"Using this approach only requires us to spend a few seconds    guessing the correct value for each byte in turn (256 options    per byte, for 32 bytes  so a total of 8192 guesses),\" boasts    the firm.  <\/p>\n<p>    \"In contrast, a direct brute-force attack on AES-256 would    require 2256 guesses and would not complete before the    end of the universe\"  <\/p>\n<p>    The next challenge is distance. Currently, Fox-IT has met    reached a goal of 30cm but says that afull meter is a    possibility given the right circumstances.  <\/p>\n<p>    \"Our work here has shown a proof of concept for TEMPEST attacks    against symmetric crypto such as AES-256. To the best of our    knowledge, this is the first public demonstration of such    attacks. The low bandwidth requirements have allowed us to    perform the attack with surprisingly cheap equipment (20    radio, modest amplifiers and filters) at significant    distances,\" it added.  <\/p>\n<p>    \"In practice this setup is well suited to attacking network    encryption appliances. Many of these targets perform bulk    encryption (possibly with attacker controlled data) and the    ciphertext is often easily captured from elsewhere in the    network.\"   <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.theinquirer.net\/inquirer\/news\/3012648\/aes-256-encryption-keys-cracked-by-hands-off-hack\" title=\"AES-256 encryption keys cracked by hands-off hack - The INQUIRER\">AES-256 encryption keys cracked by hands-off hack - The INQUIRER<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> SOME DUTCH RESEARCHERS have discovered a way of cracking AES-256 encryption using reasonably cheap gear and wireless tech. Fox-IT, which is the Dutch company, calls the attack 'Tempest' and explains that it is enabled through proximity and relies on the monitoring of electromagnetic signals in what is known as a side channel attack. Researchers put together a piece of kit worth less than $200 and were able to wirelessly extract secret AES-256 encryption keys from a distance of one metre<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-32307","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32307"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=32307"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/32307\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=32307"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=32307"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=32307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}