Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 10 submissions in the queue.
posted by LaminatorX on Friday August 22 2014, @01:40AM   Printer-friendly
from the physical-access-FTW dept.

With enough technical savvy, simply touching a laptop can suffice to extract the cryptographic keys used to secure data stored on it.

The trick is based on the fact that the “ground” electrical potential in many computers fluctuates according to the computation that is being performed by its processor—including the computations that take place when cryptographic software operates to decrypt data using a secret key.

Measuring the electrical potential leaked to your skin when you touch the metal chassis of such laptops, and analyzing that signal using sophisticated software, can be enough to determine the keys stored within, says Eran Tromer, a computer security expert at Tel Aviv University.

http://www.technologyreview.com/news/530251/how-to-break-cryptography-with-your-bare-hands/

[Paper] http://www.cs.tau.ac.il/~tromer/handsoff/

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by TK on Friday August 22 2014, @03:15PM

    by TK (2760) on Friday August 22 2014, @03:15PM (#84363)

    Isn't the dirty mains power handled by the laptop's external power supply? Even if it supplies "dirty" DC power, you could measure that directly and filter it out of your measurement from the laptop.

    I'm not saying this will make this job approach feasibility, but it could eliminate one source of noise.

    --
    The fleas have smaller fleas, upon their backs to bite them, and those fleas have lesser fleas, and so ad infinitum
    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2