1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

News Security keys leaked via touch, claim researchers

Discussion in 'Article Discussion' started by Gareth Halfacree, 21 Aug 2014.

  1. Gareth Halfacree

    Gareth Halfacree WIIGII! Staff Administrator Super Moderator Moderator

    Joined:
    4 Dec 2007
    Posts:
    11,039
    Likes Received:
    1,064
  2. Cerberus90

    Cerberus90 Car Spannerer

    Joined:
    23 Apr 2009
    Posts:
    7,488
    Likes Received:
    130
    I really don't understand how this works or how it could possibly work.

    How does measuring a ground connection tell you what's going on, other than, "It's On" or "It's Off", or "Heavy usage" or "Light usage"?
     
  3. Bungletron

    Bungletron Well-Known Member

    Joined:
    25 May 2010
    Posts:
    1,164
    Likes Received:
    57
    Kind of makes sense, the ground (in fact all terminals) will be noisy, that noise is caused by background interference. So it looks like interference emitted by the the logic part of the computer is interfering with the power circuitry then being leaked into the ground and contains useful information. While this interference is minuscule and negligible to power function it appears to be significant enough to be picked up and separated, an unfortunate side effect when you consider the two systems are isolated because conventionally one thinks isolation is most important so that the power circuitry does not interfere with the logic side since it is several orders of magnitude more powerful, this lot have looked at it the other way round, its ingenious really.

    Thats why it would work on wireless frequencies emitted too. If you have the expertise and you know what you are looking for, you get a a very sensitive spectrograph and can filter off all the other noise, you reconstruct the useful data from any emission then apply cryptography to decrypt the information you need.
     
  4. mi1ez

    mi1ez Active Member

    Joined:
    11 Jun 2009
    Posts:
    1,407
    Likes Received:
    13
    And here's where I see the downfall. If the PC was only processing crypto keys and wasn't running (for example) an OS, outputting any video/sound, listening for interrupts, and generally being a computer; this could be feasible.

    IMHO
     
  5. edzieba

    edzieba Virtual Realist

    Joined:
    14 Jan 2009
    Posts:
    2,681
    Likes Received:
    165
    This is what's known as a Side Channel attack, specifically via power analysis. The novel part here is the connection via a squishy meatbag electrode rather than a metal clamp or probe.
     
  6. Gareth Halfacree

    Gareth Halfacree WIIGII! Staff Administrator Super Moderator Moderator

    Joined:
    4 Dec 2007
    Posts:
    11,039
    Likes Received:
    1,064
    Not sure what you mean by "this could be feasible:" the researchers have already done it.
     

Share This Page