Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Black-bag cryptanalysis

From Wikipedia, the free encyclopedia
Acquisition of cryptographic secrets via burglary, or other covert means

Incryptography,black-bag cryptanalysis is aeuphemism for the acquisition of cryptographic secrets viaburglary, or other covert means – rather than mathematical or technicalcryptanalytic attack. The term refers to the black bag of equipment that a burglar would carry or ablack bag operation.

As withrubber-hose cryptanalysis, this is technically not a form of cryptanalysis; the term is usedsardonically. However, given the free availability of very high strength cryptographic systems, this type of attack is a much more serious threat to most users than mathematical attacks because it is often much easier to attempt to circumvent cryptographic systems (e.g. steal the password) than to attack them directly.

Regardless of the technique used, such methods are intended to capture highly sensitive information e.g.cryptographic keys, key-rings,passwords or unencrypted plaintext. The required information is usually copied without removing or destroying it, so capture often takes place without the victim realizing it has occurred.

Methods

[edit]

In addition to burglary, the covert means might include the installation ofkeystroke logging[1] ortrojan horse software or hardware installed on (or near to) target computers or ancillary devices. It is even possible tomonitor the electromagnetic emissions of computer displays or keyboards[2][3] from a distance of 20 metres (or more), and thereby decode what has been typed. This could be done by surveillance technicians, or via some form ofbug concealed somewhere in the room.[4] Although sophisticated technology is often used, black bag cryptanalysis can also be as simple as the process of copying a password which someone has unwisely written down on a piece of paper and left inside their desk drawer.

The case ofUnited States v. Scarfo highlighted one instance in which FBI agents using asneak and peek warrant placed a keystroke logger on an alleged criminal gang leader.[5]

See also

[edit]

References

[edit]
  1. ^"Remote Password Stealer 2.7". Download3K. Archived fromthe original on 2008-09-20.
  2. ^Elinor Mills (March 20, 2009)."Sniffing keystrokes via laser and keyboard power". ZDNet.
  3. ^"Snooping through the power socket".BBC News. July 13, 2009.
  4. ^"Keyboard sniffers to steal data".BBC News. October 21, 2008.
  5. ^"United States v. Scarfo, Criminal No. 00-404 (D.N.J.)". Electronic Privacy Information Center.

External links

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Retrieved from "https://en.wikipedia.org/w/index.php?title=Black-bag_cryptanalysis&oldid=1311649838"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp