Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Acoustic cryptanalysis

From Wikipedia, the free encyclopedia
Side-channel attack exploiting sound

Acoustic cryptanalysis is a type ofside-channel attack that exploitssounds emitted by computers or other devices.

Most of the modern acoustic cryptanalysis focuses on the sounds produced bycomputer keyboards and internalcomputer components, but historically it has also been applied toimpact printers, andelectromechanical deciphering machines.

History

[edit]

Victor Marchetti andJohn D. Marks eventually negotiated the declassification of CIA acoustic intercepts of the sounds of cleartext printing from encryption machines.[1] Technically this method of attack dates to the time ofFFT hardware being cheap enough to perform the task; in this case the late 1960s to mid-1970s. However, using other more primitive means such acoustical attacks were made in the mid-1950s.

In his bookSpycatcher, formerMI5 operativePeter Wright discusses use of an acoustic attack againstEgyptianHagelin cipher machines in 1956. The attack wascodenamed "ENGULF".[2]

Known attacks

[edit]

In 2004, Dmitri Asonov and Rakesh Agrawal of theIBMAlmaden Research Center announced thatcomputer keyboards and keypads used ontelephones andautomated teller machines (ATMs) are vulnerable to attacks based on the sounds produced by different keys. Their attack employed aneural network to recognize the key being pressed. By analyzing recorded sounds, they were able to recover the text of data being entered. These techniques allow an attacker usingcovert listening devices to obtainpasswords,passphrases,personal identification numbers (PINs), and other information entered via keyboards. In 2005, a group of UC Berkeley researchers performed a number of practical experiments demonstrating the validity of this kind of threat.[3]

Also in 2004,Adi Shamir andEran Tromer demonstrated that it may be possible to conducttiming attacks against aCPU performing cryptographic operations by analyzing variations in acoustic emissions. Analyzed emissions wereultrasonic noise emanating fromcapacitors andinductors on computermotherboards, notelectromagnetic emissions or the human-audible humming of a cooling fan.[4] Shamir and Tromer, along with new collaborator Daniel Genkin and others, then went on to successfully implement the attack on a laptop running a version ofGnuPG (anRSA implementation), using either a mobile phone located close to the laptop, or a laboratory-grade microphone located up to 4 m away, and published their experimental results in December 2013.[5]

Acoustic emissions occur in coils and capacitors because of small movements when a current surge passes through them. Capacitors in particular change diameter slightly as their many layers experience electrostatic attraction/repulsion or piezoelectric size change.[6] A coil or capacitor which emits acoustic noise will, conversely, also be microphonic, and the high-end audio industry takes steps with coils[7] and capacitors[8] to reduce these microphonics (immissions) because they can muddy a hi-fi amplifier's sound.[citation needed]

In March 2015, it was made public that some inkjet printers using ultrasonic heads can be read back using high frequencyMEMS microphones to record the unique acoustic signals from each nozzle and using timing reconstruction with known printed data,[citation needed] that is, "confidential" in 12-point font.[clarification needed] Thermal printers can also be read using similar methods but with less fidelity as the signals from the bursting bubbles are weaker.[citation needed] The hack also involved implanting a microphone, chip storage IC and burst transmitter with long-life Li+ battery into doctored cartridges substituted for genuine ones sent by post to the target, typically a bank, then retrieved from the garbage using challenge-responseRFID chip.[citation needed] A similar work on reconstructing printouts made bydot-matrix printers was publicized in 2011.[9]

A new acoustic cryptanalysis technique discovered by a research team at Israel'sBen-Gurion University Cybersecurity Research Center allows data to be extracted using a computer's speakers and headphones.[citation needed]Forbes published a report stating that researchers found a way to see information being displayed, by using microphone, with 96.5% accuracy.[10]

In 2016, Genkin, Shamir, and Tromer published another paper that described a key extraction attack that relied on the acoustic emissions from laptop devices during the decryption process. They demonstrated the success of their attack with both a simple mobile phone and a more sensitive microphone.[11]

Countermeasures

[edit]

This kind of cryptanalysis can be defeated by generating sounds that are in the same spectrum and same form as keypresses. If sounds of actual keypresses are randomly replayed, it may be possible to totally defeat such kinds of attacks. It is advisable to use at least 5 different recorded variations (36 x 5 = 180 variations) for each keypress to get around the issue ofFFT fingerprinting.[12] Alternatively,white noise of a sufficient volume (which may be simpler to generate for playback) will also mask the acoustic emanations of individual keypresses.

See also

[edit]

References

[edit]
  1. ^Marchetti, Victor; Marks, John (1974).The CIA and the Cult of Intelligence. Knopf.ISBN 0394482395.
  2. ^Wright, Peter (1987),Spycatcher: The candid autobiography of a senior intelligence officer, Viking
  3. ^Yang, Sarah (14 September 2005)."Researchers recover typed text using audio recording of keystrokes".UC Berkeley News.
  4. ^Shamir, Adi; Tromer, Eran."Acoustic cryptanalysis: On nosy people and noisy machines".tau.ac.il.
  5. ^Genkin, Daniel; Shamir, Adi; Tromer, Eran."RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis".tau.ac.il.
  6. ^"Capacitors for Reduced Micro phonics and Sound Emission"(PDF).CARTS 2007 Symposium Proceedings, Albuquerque. Electronic Components, Assemblies & Materials Association (ECA). March 2007. Archived fromthe original(PDF) on 2019-11-16. Retrieved2014-01-24.
  7. ^"FoilQ, .50mH 16ga". Meniscusaudio.com. Archived fromthe original on 2014-02-20. Retrieved2014-01-24.
  8. ^"50uF 250volt Metallized Polyester Mylar Film Capacitor-ERSE". Erseaudio.com. Archived fromthe original on 2014-02-01. Retrieved2014-01-24.
  9. ^Michael Backes; Markus Dürmuth; Sebastian Gerling; Manfred Pinkal; Caroline Sporleder (January 9, 2011)."Acoustic Side-Channel Attacks on Printers"(PDF).eecs.umich.edu. Archived fromthe original(PDF) on April 2, 2015. RetrievedMarch 10, 2015.
  10. ^Mathews, Lee (2018-08-31)."Now Hackers Can Spy On You By Listening To Your Screen".Forbes. Retrieved2019-03-13.
  11. ^Genkin, Daniel; Shamir, Adi; Tromer, Eran (2016-02-08)."Acoustic Cryptanalysis".Journal of Cryptology.30 (2):392–443.doi:10.1007/s00145-015-9224-2.ISSN 0933-2790.S2CID 31377774.
  12. ^Asonov, Dmitri; Agrawal, Rakesh (2004),"Keyboard Acoustic Emanations"(PDF),IBM Almaden Research Center, archived fromthe original(PDF) on 2012-02-27, retrieved2007-05-08
Retrieved from "https://en.wikipedia.org/w/index.php?title=Acoustic_cryptanalysis&oldid=1305158958"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp