SlideShare a Scribd company logo
1 of 13
Download to read offline
Emission Security (EMSEC)

                      Author:   Abdollah Shirvani
                                Shirvani.86@Gmail.com

            2st systems security Conference- Ramiran. Co, Tehran, Iran,

                                      Spring 2009

Introduction
What is Emission Security? (EMSEC)

Computer and communications devices emit numerous forms of energy. It is part of their
normal operation: the user wants feedback and needs to hear or to see something.
But more emissions than most users are aware of, are the result of unintended side
effects. E.g. anything that can carry a current can act like an antenna. When a conductor
drives an oscillating current, which is very common in digital devices, it emits
electromagnetic radiation carrying both power and signals away from the source.
The trouble begins when the emitted energy carries information about processed data. An
eavesdropper can intercept and analyze such compromising emanations to steal
information.

                                A word on TEMPEST
TEMPEST is often used more broadly for the entire field of EMSEC, but originally it is a
U.S. government code word for a set of standards limiting electric or electromagnetic
radiation emanations from electronic equipment to prevent electronic espionage. Find the
complete article on Wikipedia. Much knowledge in this area is classified military
research, but basic information has become available since 1995. The following examples
show types of compromising emanations that have been demonstrated in the open
literature.
Types of compromising emanations
    ď‚· Electromagnetic waves radiated into free space or along metallic conductors
Cathode-ray tube (CRT) displays act as a parasitic transmission antenna, they emit video
signal as electromagnetic waves. [Eck1985]
ď‚· Cross-Talk
Where data and telephone lines share the same cable conduit for several meters
information from one cable may be transmitted to the other.
    ď‚· Power-supply current fluctuations
Line drivers for data cables have data-dependent power consumption, which can affect
the supply voltage. [Smulders1990]
    ď‚· Vibrations, acoustic and ultrasonic emissions
Acoustic emanations of matrix printers can carry substantial information about the text
being printed. [SEPI1991] PC keyboards are vulnerable to attacks based on
differentiating the sound emanated by different keys. [Asonov2004]
    ď‚· High-frequency optical signals
LED status indicators on data communication equipment, under certain conditions, are
shown to carry a modulated optical signal that is significantly correlated with information
being processed

History
19th century
First appearance of the emanation problem was in the 19th century, when extensive
telephone wire networks were laid out. It came to cross-talks between telephone wires.
People sometimes could hear other conversations on their telephone line. One way of
dealing with it was to use "transpositions," whereby the wires were crossed over at
intervals to make the circuit a twisted pair.

1914
The flrst appearance of compromising emanations in warfare seems to date to 1914. Field
telephone wires were laid parallel to enemy trenches to connect the troops with their
headquarters. The effect was again cross-talks. Listening posts were quickly established
and protective measures were introduced, including the use of twisted-pair cable.

Mid-1950s
The exact date is not known in public, but it happens sometime in 1950, when the U.S.
Government becomes concerned about the Emission Security problem and establishes the
TEMPEST Program. The first TEMPEST standards were developed to deal with the
increasing danger of espionage.

1960
In Great Britain were TV detector vans used to find illegal owners of television sets. The
reason was, that TV owners had to pay an annual license fee.

1960
In 1960 was the british secret service MI5 ordered to eavesdrop the French embassy in
the course of negotiations about joining the European Economic Community. The crypto
analysts were not able to decrypt the enciphered signal from the French embassy, but
they noticed a faint secondary signal, which was the plain text.

1970s
All about the title Emission Security vanished from the open literature.

1984
The secret service of GDR called MfS spied out the Ministry of Foreign Trade by
eavesdropping the compromising emanations.

1985
The dutch researcher Wim van Eck published an unclassified paper of security risks of
emanations from computer monitors. This paper caused consternation in the security
community, where all thought, that those attacks were only possible with very high tech
equipment. But Wim van Eck eavesdropped a system using just 15$ worth of equipment
plus a television set. With this paper Emission Security came back to public attention.

1990s
Many published research about Emission Security were made for example about
Vulnerabilities of smart cards (Markus Kuhn and Ross Anderson 1996) and
Vulnerabilities of crypto-systems (Paul Kocher). Kuhn and Anderson also published a
paper showing that compromising emanations from PCs could be countered with
measures in software. 1995 were also basic information of the TEMPEST standard
published.

Physical Backgrounds
The strongest transmitters in PCs are displaying devices like graphic cards, video cables
or monitors, because they work with high frequencies and they need much power. So the
emanation of these devices is high energetically and it has high ranges. In addition are
visual signals periodical (e.g. the output of visual memory of a graphic card is 70-100
times in one second). Periodic signals are easy to eavesdrop, because the noise can be
reduced by middling. These components radiate in three frequency bands:
 - The vertical diverting signal works in lower kHz band.
 - The horizontal diverting signal works in lower MHz band (Long and medium wave).
 - The video signal has frequencies up to 100 MHz
The diverting signals are very easy to eavesdrop and reconstruct, but they contain no
important information like the video signal. The video signal is an overlapping of sinus
signals with different frequencies. Via fourier transformation is it possible to get the
spectrum of the video signal which contain all information to reconstruct it. The spectrum
is repeated at all multiples of the pixel cycle (reciprocal of time the electron ray needs to
get from one pixel to his neighbor). So the information is also available at higher
frequencies. This is called "upper waves". The intensity of upper waves depends on
sharpness of the pixels.
Video cable, power supply and amplifier of monitors work like antennas especially for
upper waves. But not all information’s can be reconstructed from emanations. Letters
produce a wide band signal because of their thin vertical lines. Texts contain many
redundancy because they use only a subset of all possible pixel-patterns. So Texts are
easy to reconstruct. But there is no procedure known to rebuild color information. So
pictures are difficult to reconstruct.




                                    Attacks
Video Display Units
In the early 80's the Dutch PTT (Post, Telephone, and Telegraph) has tested monitors and
keyboards connected to telephone lines in homes for sending and receiving mail. During
the tests some users complained about interference from their neighbor's units. Several
persons were able to read a neighbor's mail as the neighbor viewed electronic mail on the
screen at home.
Wim Van Eck at the Dr. Neher Laboratories was assigned the task of developing an
inexpensive detection unit to monitor RF electromagnetic radiation to evaluate monitors
to help with installation problems.
It was considered very difficult to reconstruct the data hidden in the radiated field, only
possible for professionals with access to very sophisticated detection and decoding
equipment. Van Ecks research proofed this to be wrong. He made a demonstration with
material for less than $220, based on a modified TV set.
The structure of the video signal shows remarkable resemblance to a normal broadcast
TV signal. The pixel rate may even be located inside the TV broadcast bonds, only the
synchronization information is missing and has to be reconstructed. The signal is emitted
by the CRT itself and by the cable connecting the display with the hardware generating
the image. As a result even LCD displays are sensitive to the attack. Try out Tempest for
Eliza to see that this is more than theory.
[Eck1985]

Keyboard Acoustic Emanations
The sound of clicks produced when typing on a PC keyboard can differ slightly from key
to key, although the clicks of different keys sound very similar to the human ear. A neural
network can be trained to differentiate the keys to successfully carry out an attack. The
keyboard plate acts like a drum, and each key hit the drum in a different location and
produces a unique frequency or sound that the neural networking software can decipher.
The attack is very cheap. All you need is a computer, standard software to record the
clicks and to train a neural network (available for free - read the paper) and a microphone.
The attack is simple. It is non-invasive - no physical intrusion into the system is needed
and the quality of the sound is not very important. It can be recorded from substantial
distance (even with a cell phone).
[Asonov2004]

Radiation from RS-232 Cables
Experiments on eavesdropping RS-232 cable signals prove that it is possible to intercept
data signals running along an RS-232 cable, by picking up and decoding the
electromagnetic radiation produced by the cable. The rise and fall times of the data signal
are very short. Consequently, they correspond to high frequency components resulting in
considerable radiation. In many cases, the RS-232 cables are not shielded, or the shield is
not adequately connected to the equipment. Usually, the data is coded in well-known
character sets, like ASCII.
The interception-distance is limited to several meters, but the needed equipment is small,
simple and cheap: a pocket radio receiver, a tape recorder and a computer to analyze the
data.
[Smulders1990]
                                Countermeasures
Countermeasures against bugs
Certainly the compromising emanations can be eavesdropped in passive ways, but often
the eavesdropper cannot get close enough for long time to get all information from an IT-
device he needs. So he will use bugs, which reinforce these signals. There are some
countermeasures against bugs, but they all have disadvantages.
First of all is it possible to use "non linear junction detectors" to find hidden electronic
equipment at close range. It works because the transistors, diodes, and other nonlinear
junctions in electronic equipment have the effect of rectifying incident radio frequency
signals. The device broadcasts a weak radio signal, and listens for harmonics of this
signal. However, if the bugs were planted near other electronics then the nonlinear
junction detector is not much help.
Secondly there are some "surveillance receivers" on the market. This one detect
conspicuous signals in the radio spectrum between 10 kHz and 3 GHz, which cannot be
explained as broadcast, police, air traffic control and so on. But there are bugs which
operate on same frequencies and protocols like mobile phones.
The most drastic countermeasure is to build the buildings completely shielded or
underground. In that case are bugs useless because their signals won’t get outside. This
solution is sometimes used for military organizations.

Countermeasures against emanation
Without doubt the best solution is to place sensitive devices in a Faraday cage. That
means that the room is completely shielded and no wires (e.g. power supply or telephone)
and no pipelines (e.g. for heating) should get outside.
A good base is to do red/black separation. Red equipment (carrying confidential data) has
to be isolated from black equipment (sends signals to outside world). But some devices
are red and black (e.g. crypting machines). Another problem is, that the standards for
properly shielded hardware are classified. Only a few firms produce this hardware in
small quantities. unnecessary to mention that this hardware is very expensive.
Another way is the Zone Model. The Zone Model takes into account the propagation
conditions for compromising emanations. The attenuation of radiation from IT device to
the potential receiver is determined by metrological means. Basing on that the
environment is divided in security-critical Zones. Siemens offers zone0-devices, which
have very low emanation (not possible to eavesdrop outside the closed zone called
zone0). Zone0-devices must be registered with the BSI (Bundesamt fĂĽr Sicherheit in der
Informationstechnik). They cost tenfold more than comparable devices without this
standard.
One word on Jammers: Jammers are inefficient, because their strength is restricted by
German law. In addition can the signals of jammers calculated out by eavesdropper after
observing it for several time, if the jammers signal is not correlated with the other signals.
A much cheaper and efficient solution is "Soft Tempest". Soft Tempest is based on the
work by Markus Kuhn and Ross Anderson and uses software techniques to filter, mask,
or render incomprehensible the information bearing electromagnetic emanations from a
computer system. For example is it possible to remove the top 30% of Fourier transform
of a standard font with a low-pass-filter. The user dont notice that but the eavesdropper is
dependent on these "upper waves".
Figures 15.4 and 15.5 display photographs of the screen with the two video signals from
Figures 15.2 and 15.3. The difference in the emitted RF is dramatic, as illustrated in the
photographs in Figures 15.6 and 15.7. These show the potentially compromising
emanations, as seen by a Tempest monitoring receiver.




                                 Passive Attacks
That is, attacks in which the opponent makes use of whatever electromagnetic
signals are presented to him without any effort on her part to create. Broadly
speaking, there are two categories. The signal can either be conducted over some
kind of circuit (such as a power line or phone line) or it may be radiated as radio
frequency energy. These two types of threat are referred to by the military as Hijack
and Tempest, respectively. They are not mutually exclusive; RF threats often have a
conducted component. For example, radio signals emitted by a computer can be
picked up by the mains power circuits and conducted into neighboring buildings.
Still, it’s a reasonable working classification most of the time.

Type of Passive attack:
1-Leakage through Power and Signal Cables
2-Leakage through RF Signals

                                     Active Attacks
But it’s not enough to simply encrypt a keyboard scan pattern to protect it, as the attacker
can use active as well as passive techniques. Against a keyboard, the technique is to irradiate the
cable with a radio wave at its resonant frequency. Thanks to the nonlinear junction effect, the
keypress codes are modulated into the return signal, which is reradiated by the cable. This can be
picked up at a distance of 50 to 100 yards. To prevent it, one must also encrypt the signal from
the keyboard to the PC.

Type of Passive attack:

1-Tempest Viruses
2- Nonstop

Commercial Exploitation
Not all Emses attacks are conducted in the context of covert military surveillance or
Laboratory attacks on tamper-resistant devices. I already mentioned the TV detector
vans used in Britain to catch TV license defaulters and the customers of pay-TV pirates.
There are also marketing applications. U.S. venue operator SFX Entertainment
monitors what customers are playing on their car radios as they drive into venue parking
lots by picking up the stray RF from the radio’s local oscillator. Although legal,
this alarms privacy advocates [728]. The same equipment has been sold to car dealers,
mall operators, and radio stations.

Defenses
The techniques that can be used to defend smartcards against active Emsec threats are
Similar, though not quite the same, to those used in the passive case.
Timing randomness—jitters—is still useful, as a naive opponent might no longer
Know precisely when to insert the glitch. However, a clever opponent may well be able
to analyze the power curve from the processor in real time, and compare it against the
code so as to spot the critical target instructions. In addition, fault attacks are hard to
stop with jitter, as the precise location of the fault in the code is not usually critical.
In some cases, defensive programming is enough. For example, the PIN search described
in Section 15.5.5 is prevented in more modern implementations by decrementing
the counter, soliciting the PIN, then increasing the counter again if it’s correct.
Differential fault attacks on public key protocols can be made a lot harder if you just
check the result.
Other systems use specific protective hardware, such as a circuit that integrates the
card reset with the circuit that detects clock frequencies that are too high or too low.
Normal resets involve halving the clock frequency for a few cycles, so an attacker who
found some means of disabling the monitoring function would quite likely find himself
unable to reset the card at all on power-up .
Current defenses against glitch attacks are not entirely foolproof, and extensive device
testing is highly advisable. New technologies, such as the use of self-timed logic,
may improve things by providing a high level of protection against both active and
passive threats. In the meantime, if you have to write a smartcard application, attacks
based on glitching merit careful consideration.


How Serious Are Emsec Attacks?
Technical surveillance and its countermeasures are the most important aspect of Emsec,
in both government and industry; they are likely to remain so. The range of bugs
and other surveillance devices that can be bought easily is large and growing. The
motivation for people to spy on their rivals, employees, and others will continue. If
anything, the move to a wired world will make electronic surveillance more important,
and countermeasures will take up more of security budgets.
Those aspects of Emsec that concern equipment not designed for surveillance— Tempest,
Teapot, Hijack, Nonstop, and the various types of power and glitch attack—are set to
become another of the many technologies that were initially developed in the government
sector but then start being important in the design of commercial
Products.

Governments
The Emsec threats to embassies in hostile countries are real. If your country is forced
by the president of Lower Slobovia to place its embassy in the second floor of an office
block whose first and third floors are occupied by the local secret police, then security
is an extremely hard problem. Shielding all electronic equipment (except that used for
deception) will be part of the solution. In less threatening environments, the use of
hardware Tempest shielding is more doubtful.
Despite the hype with which the Tempest industry maintained itself during the Cold
War, there is growing scepticism about whether any actual Tempest attacks had ever
been mounted by foreign agents, though anecdotes abound. It’s said, for example, that
the only known use of such surveillance techniques against U.S. interests in the whole
of North America was by Canadian intelligence personnel, who overheard U.S. diplomats
discussing the U.S. bottom line in grain sales to China; and that the East German
Stasi were found to have maps of suitable parking places for Tempest vans in West
German towns. But I’ve not found anything that can be nailed down to a reliable
source, and having been driven around an English town looking for Tempest signals, I
can testify that launching such attacks is much harder in practice than it might seem in
theory. Governments now tend to be much more relaxed about Tempest risks than 10
years ago.

Businesses
In the private sector, the reverse is the case. The discovery of fault attacks, and then
power attacks, was a big deal for the smartcard industry, and held up for probably two
years the deployment of smartcards in banking applications in those countries that
hadn’t already committed to them. Blocking these attacks turns out to be difficult, and
doing it properly will involve a further generation of hardware design.

And what about the future?
The “no security” aspects of emission management, namely RFI/EMC, are becoming
Steadily more important. Ever higher clock speeds, plus the introduction of all sorts
of wireless devices and networks, and the proliferation of digital electronics into many
Devices that were previously analogue or mechanical, are making electromagnetic
Compatibility a steadily harder and yet more pressing problem. Different industry
groups, manage a host of incompatible standards many of which are rapidly becoming
Obsolete—for example, by not requiring testing above 1 GHz, or by assuming protection
distances that are no longer reasonable .
On the security side, attacks are likely to become easier. The advent of software radios—
radios that digitize a signal at the intermediate frequency stage and do all the
demodulation and subsequent processing in software—were, until recently, an expensive
military curiosity , but are now finding applications in places like cellular
radio base stations. The next generation may be consumer devices, designed to function
as GPS receivers, GSM phones, radio LAN base stations, and to support whatever
other radio-based services have been licensed locally—all with only a change in
software.
Once people learn how to program them, they might just as easily use them for
Tempest attacks.
Finally, Emsec issues are not entirely divorced from electronic warfare. As society
becomes more dependent on devices that are vulnerable to strong radio frequency signals
such as the high-power microwaves generated by military radars the temptation
Side Channel Attack
In cryptography, a side channel attack is any attack
based on information gained from the physical
implementation of a cryptosystem, rather than
theoretical weaknesses in the algorithms (compare
cryptanalysis). For example, timing information,
power consumption, electromagnetic leaks or even
sound can provide an extra source of information
which can be exploited to break the system. Many
side-channel attacks require considerable technical
knowledge of the internal operation of the system on
which the cryptography is implemented.
Attempts to break a cryptosystem by deceiving or coercing people with legitimate access
are not typically called side-channel attacks: see social engineering and rubber-hose
cryptanalysis. For attacks on computer systems themselves (which are often used to
perform cryptography and thus contain cryptographic keys or plaintexts), see computer
security.

General
General classes of side channel attack include:
     Timing attack — attacks based on measuring how much time various
        computations take to perform.
     Architectural side-effect attacks — attacks which take advantage of side-effects of
        performing a computation on a particular machine architecture (e.g., evicting
        cache lines).
     Power monitoring attack — attacks which make use of varying power
        consumption by the hardware during computation.
     TEMPEST (aka van Eck or radiation monitoring) attack — attacks based on
        leaked electromagnetic radiation which can directly provide plaintexts and other
        information.
     Acoustic cryptanalysis — attacks which exploit sound produced during a
        computation (rather like power analysis).
In all cases, the underlying principle is that physical effects caused by the operation of a
cryptosystem (on the side) can provide useful extra information about secrets in the
system, for example, the cryptographic key, partial state information, full or partial
plaintexts and so forth. The term cryptophthora (secret degradation) is sometimes used to
express the degradation of secret key material resulting from side channel leakage.

Examples
A timing attack watches data movement into and out of the CPU, or memory, on the
hardware running the cryptosystem or algorithm. Simply by observing how long it takes
to transfer key information, it is sometimes possible to determine how long the key is in
this instance (or to rule out certain lengths which can also be crypt analytically useful).
Internal operational stages in many cipher implementations provide information
(typically partial) about the plaintext, key values and so on, and some of this information
can be inferred from observed timings. Alternatively, a timing attack may simply watch
for the length of time a cryptographic algorithm requires -- this alone is sometimes
enough information to be cryptanalytically useful.
A power monitoring attack can provide similar information by observing the power lines
to the hardware, especially the CPU. As with a timing attack, considerable information is
inferable for some algorithm implementations under some circumstances.
As a fundamental and inevitable fact of electrical life, fluctuations in current generate
radio waves, making whatever is producing the currents subject -- at least in principle --
to a van Eck (aka, TEMPEST) attack. If the currents concerned are patterned in
distinguishable ways, which is typically the case, the radiation can be recorded and used
to infer information about the operation of the associated hardware. According to former
MI5 officer Peter Wright, the British Security Service analysed emissions from French
cipher equipment in the 1960s. In the 1980s, Soviet eavesdroppers were known to plant
bugs inside IBM Electric typewriters to monitor the electrical noise generated as the type
ball rotated and pitched to strike the paper; the characteristics of those signals could
determine which key was pressed.
If the relevant currents are those associated with a display device (ie, highly patterned
and intended to produce human readable images), the task is greatly eased. CRT displays
use substantial currents to steer their electron beams and they have been 'snooped' in real
time with minimum cost hardware from considerable distances (hundreds of meters have
been demonstrated). LCDs require, and use, smaller currents and are less vulnerable --
which is not to say they are invulnerable.
Also as an inescapable fact of electrical life in actual circuits, flowing currents heat the
materials through which they flow. Those materials also continually lose heat to the
environment due to other equally fundamental facts of thermodynamic existence, so there
is a continually changing thermally induced mechanical stress as a result of these heating
and cooling effects. That stress appears to be the most significant contributor to low level
acoustic (i.e. noise) emissions from operating CPUs (about 10 kHz in some cases).
Recent research by Shamir et al. has demonstrated that information about the operation of
cryptosystems and algorithms can be obtained in this way as well. This is an acoustic
attack; if the surface of the CPU chip, or in some cases the CPU package, can be
observed, infrared images can also provide information about the code being executed on
the CPU, known as a thermal imaging attack.

Countermeasures
Because side channel attacks rely on emitted information (like electromagnetic radiation
or sound) or on relationship information (as in timing and power attacks), the most
reasonable methods of countering such attacks is to limit the release of such information
or access to those relationships. Displays are now commercially available which have
been specially shielded to lessen electromagnetic emissions reducing susceptibility to
TEMPEST attacks. Power line conditioning and filtering can help with power monitoring
attacks, as can some continuous-duty UPSs. Physical security of hardware can reduce the
risk of surreptitious installation of microphones (to counter acoustic attacks) and other
micro-monitoring devices (against CPU power draw or thermal imaging attacks).


Summary
Emission security covers a whole range of threats in which the security of systems can be
subverted by compromising emanations, whether from implanted bugs, from
unintentional radio frequency or conducted electromagnetic leakage, or from emanations
that are induced in some way. Although originally a concern in the national intelligence
Community, Emsec is now a real issue for companies that build security products such as
smartcards and cash machines. Many of these products can be defeated by observing
stray RF or conducted signals. Protecting against such threats isn’t as straightforward as it
might seem



References:
   1. Compromising Reflections -or- How to Read LCD Monitors around the
      Corner.
   2. "A Network-based Asynchronous Architecture for Cryptographic Devices"
      by Ljubljana Spadavecchia 2005 in sections "3.2.3 Countermeasures", "3.4.2
      Countermeasures",       "3.5.6    Countermeasures",    "3.5.7   Software
      countermeasures", "3.5.8 Hardware countermeasures", and "4.10 Side-
      channel analysis of asynchronous architectures".
   3. "The Program Counter Security Model: Automatic Detection and Removal
      of Control-Flow Side Channel Attacks" [1] by David Molnar, Matt
      Piotrowski, David Schultz, David Wagner (2005)
   4. http://en.wikipedia.org/wiki/Van_Eck_phreaking
   5. Public version of NACSIM 5000 http://cryptome.sabotage.org/nacsim-
      5000.htm
   6. How old is TEMPEST?
   7. TEMPEST: a signal problem – The story of the discovery of various
      compromising radiations from communications and Comsec equipment,
      Cryptologic Spectrum, Vol. 2, No. 3, National Security Agency, Summer
      1972, partially FOAI declassified 2007-09-27
8. Deborah Russell, G.T. Gangemi Sr.: Computer Security Basics. O'Reilly,
   1991, ISBN 9780937175712, Chapter 10: TEMPEST, page 253 last
   paragraph.
9. Computers and Security, vol. 7, number 4
10.See "TEMPEST 101" and "TEMPEST and QinetiQ" under External Links.
11.http://www.eskimo.com/~joelm/tempest.html The Complete, Unofficial
   TEMPEST Information Page
12.TEMPEST Level Standards, SST web site
13.http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_19
   73.pdf Page 90
14.J. Loughry and D. A. Umphress. Information Leakage from Optical
   Emanations (.pdf file), ACM Transactions on Information and System
   Security, Vol. 5, No. 3, August 2002, pp. 262-289
15.Martin Vuagnoux and Sylvain Pasini Compromising radiation emanations of
   wired keyboards

More Related Content

What's hot

object oriented methodologies
object oriented methodologiesobject oriented methodologies
object oriented methodologiesAmith Tiwari
 
C# programming language
C# programming languageC# programming language
C# programming languageswarnapatil
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | EdurekaEdureka!
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmppPrem Narain
 
dot net technology
dot net technologydot net technology
dot net technologyImran Khan
 
Compilers
CompilersCompilers
CompilersBense Tony
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testingMd Mamunur Rashid
 
Error Detection & Recovery
Error Detection & RecoveryError Detection & Recovery
Error Detection & RecoveryAkhil Kaushik
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compilerIffat Anjum
 
Chap 1-language processor
Chap 1-language processorChap 1-language processor
Chap 1-language processorshindept123
 
Lecture 1 introduction to language processors
Lecture 1  introduction to language processorsLecture 1  introduction to language processors
Lecture 1 introduction to language processorsRebaz Najeeb
 

What's hot (20)

Macro-processor
Macro-processorMacro-processor
Macro-processor
 
object oriented methodologies
object oriented methodologiesobject oriented methodologies
object oriented methodologies
 
C# programming language
C# programming languageC# programming language
C# programming language
 
Vb script
Vb scriptVb script
Vb script
 
Java tutorial PPT
Java tutorial PPTJava tutorial PPT
Java tutorial PPT
 
What is Integration Testing? | Edureka
What is Integration Testing? | EdurekaWhat is Integration Testing? | Edureka
What is Integration Testing? | Edureka
 
Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Vbscript
VbscriptVbscript
Vbscript
 
Ejabberd with xmpp
Ejabberd with xmppEjabberd with xmpp
Ejabberd with xmpp
 
dot net technology
dot net technologydot net technology
dot net technology
 
Compilers
CompilersCompilers
Compilers
 
Computer language
Computer languageComputer language
Computer language
 
Principles of Software testing
Principles of Software testingPrinciples of Software testing
Principles of Software testing
 
Introduction to Compiler
Introduction to CompilerIntroduction to Compiler
Introduction to Compiler
 
Error Detection & Recovery
Error Detection & RecoveryError Detection & Recovery
Error Detection & Recovery
 
Lecture 01 introduction to compiler
Lecture 01 introduction to compilerLecture 01 introduction to compiler
Lecture 01 introduction to compiler
 
Chap 1-language processor
Chap 1-language processorChap 1-language processor
Chap 1-language processor
 
Lecture 1 introduction to language processors
Lecture 1  introduction to language processorsLecture 1  introduction to language processors
Lecture 1 introduction to language processors
 
Web application
Web applicationWeb application
Web application
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 

Similar to Emission security- Tempest Attacks

Comm introduction
Comm introductionComm introduction
Comm introductionHattori Sidek
 
Comm introduction
Comm introductionComm introduction
Comm introductionmkazree
 
Telecommunications
TelecommunicationsTelecommunications
TelecommunicationsMoeed ur Rehman
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsSURESHA V
 
Trabajo de nuevas tecnologĂ­as
Trabajo de nuevas tecnologĂ­asTrabajo de nuevas tecnologĂ­as
Trabajo de nuevas tecnologĂ­asyomacaro
 
Basic Electronics Chp-9 General Science 9th 10th
Basic Electronics Chp-9 General Science 9th 10thBasic Electronics Chp-9 General Science 9th 10th
Basic Electronics Chp-9 General Science 9th 10thKamran Abdullah
 
Ch 01 part 2 - history of telecommunications and regulations
Ch 01    part 2 - history of telecommunications and regulations Ch 01    part 2 - history of telecommunications and regulations
Ch 01 part 2 - history of telecommunications and regulations sakariachromabook
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networksSopon Tumchota
 
ch01_INTRODUCTION_MOBILE COMPUTING.pptx
ch01_INTRODUCTION_MOBILE COMPUTING.pptxch01_INTRODUCTION_MOBILE COMPUTING.pptx
ch01_INTRODUCTION_MOBILE COMPUTING.pptxAnjLegaspi1
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computingDavid Livingston J
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Karen Gilchrist
 
Principles of communication engineering
Principles of communication engineeringPrinciples of communication engineering
Principles of communication engineeringLochan Neupane
 
Technical report on Transistor Based Intercom System
Technical report on Transistor Based Intercom SystemTechnical report on Transistor Based Intercom System
Technical report on Transistor Based Intercom SystemSourav Rakshit
 
Details on Electronics and communication
Details on Electronics and communicationDetails on Electronics and communication
Details on Electronics and communicationKumaran Vinayagam
 

Similar to Emission security- Tempest Attacks (20)

Eu 1 lp 3
Eu 1 lp 3Eu 1 lp 3
Eu 1 lp 3
 
Comm introduction
Comm introductionComm introduction
Comm introduction
 
Comm introduction
Comm introductionComm introduction
Comm introduction
 
Telecommunications
TelecommunicationsTelecommunications
Telecommunications
 
Wireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU studentsWireless communication for 8th sem EC VTU students
Wireless communication for 8th sem EC VTU students
 
Trabajo de nuevas tecnologĂ­as
Trabajo de nuevas tecnologĂ­asTrabajo de nuevas tecnologĂ­as
Trabajo de nuevas tecnologĂ­as
 
Basic Electronics Chp-9 General Science 9th 10th
Basic Electronics Chp-9 General Science 9th 10thBasic Electronics Chp-9 General Science 9th 10th
Basic Electronics Chp-9 General Science 9th 10th
 
Ch 01 part 2 - history of telecommunications and regulations
Ch 01    part 2 - history of telecommunications and regulations Ch 01    part 2 - history of telecommunications and regulations
Ch 01 part 2 - history of telecommunications and regulations
 
14A81A05A0
14A81A05A014A81A05A0
14A81A05A0
 
Introduction to telephony
Introduction to telephonyIntroduction to telephony
Introduction to telephony
 
Telecommunications and networks
Telecommunications and networksTelecommunications and networks
Telecommunications and networks
 
Dcn
DcnDcn
Dcn
 
ch01_INTRODUCTION_MOBILE COMPUTING.pptx
ch01_INTRODUCTION_MOBILE COMPUTING.pptxch01_INTRODUCTION_MOBILE COMPUTING.pptx
ch01_INTRODUCTION_MOBILE COMPUTING.pptx
 
Introduction & history of mobile computing
Introduction & history of mobile computingIntroduction & history of mobile computing
Introduction & history of mobile computing
 
Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...Implementing Wireless Network For Computer Communication...
Implementing Wireless Network For Computer Communication...
 
Principles of communication engineering
Principles of communication engineeringPrinciples of communication engineering
Principles of communication engineering
 
Technical report on Transistor Based Intercom System
Technical report on Transistor Based Intercom SystemTechnical report on Transistor Based Intercom System
Technical report on Transistor Based Intercom System
 
Details on Electronics and communication
Details on Electronics and communicationDetails on Electronics and communication
Details on Electronics and communication
 
S0735272711100074_preview
S0735272711100074_previewS0735272711100074_preview
S0735272711100074_preview
 
CLASS 1.pptx
CLASS 1.pptxCLASS 1.pptx
CLASS 1.pptx
 

Recently uploaded

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 

Recently uploaded (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 

Emission security- Tempest Attacks

  • 1. Emission Security (EMSEC) Author: Abdollah Shirvani Shirvani.86@Gmail.com 2st systems security Conference- Ramiran. Co, Tehran, Iran, Spring 2009 Introduction What is Emission Security? (EMSEC) Computer and communications devices emit numerous forms of energy. It is part of their normal operation: the user wants feedback and needs to hear or to see something. But more emissions than most users are aware of, are the result of unintended side effects. E.g. anything that can carry a current can act like an antenna. When a conductor drives an oscillating current, which is very common in digital devices, it emits electromagnetic radiation carrying both power and signals away from the source. The trouble begins when the emitted energy carries information about processed data. An eavesdropper can intercept and analyze such compromising emanations to steal information. A word on TEMPEST TEMPEST is often used more broadly for the entire field of EMSEC, but originally it is a U.S. government code word for a set of standards limiting electric or electromagnetic radiation emanations from electronic equipment to prevent electronic espionage. Find the complete article on Wikipedia. Much knowledge in this area is classified military research, but basic information has become available since 1995. The following examples show types of compromising emanations that have been demonstrated in the open literature. Types of compromising emanations ď‚· Electromagnetic waves radiated into free space or along metallic conductors Cathode-ray tube (CRT) displays act as a parasitic transmission antenna, they emit video signal as electromagnetic waves. [Eck1985]
  • 2. ď‚· Cross-Talk Where data and telephone lines share the same cable conduit for several meters information from one cable may be transmitted to the other. ď‚· Power-supply current fluctuations Line drivers for data cables have data-dependent power consumption, which can affect the supply voltage. [Smulders1990] ď‚· Vibrations, acoustic and ultrasonic emissions Acoustic emanations of matrix printers can carry substantial information about the text being printed. [SEPI1991] PC keyboards are vulnerable to attacks based on differentiating the sound emanated by different keys. [Asonov2004] ď‚· High-frequency optical signals LED status indicators on data communication equipment, under certain conditions, are shown to carry a modulated optical signal that is significantly correlated with information being processed History 19th century First appearance of the emanation problem was in the 19th century, when extensive telephone wire networks were laid out. It came to cross-talks between telephone wires. People sometimes could hear other conversations on their telephone line. One way of dealing with it was to use "transpositions," whereby the wires were crossed over at intervals to make the circuit a twisted pair. 1914 The flrst appearance of compromising emanations in warfare seems to date to 1914. Field telephone wires were laid parallel to enemy trenches to connect the troops with their headquarters. The effect was again cross-talks. Listening posts were quickly established and protective measures were introduced, including the use of twisted-pair cable. Mid-1950s The exact date is not known in public, but it happens sometime in 1950, when the U.S. Government becomes concerned about the Emission Security problem and establishes the TEMPEST Program. The first TEMPEST standards were developed to deal with the increasing danger of espionage. 1960 In Great Britain were TV detector vans used to find illegal owners of television sets. The reason was, that TV owners had to pay an annual license fee. 1960 In 1960 was the british secret service MI5 ordered to eavesdrop the French embassy in the course of negotiations about joining the European Economic Community. The crypto
  • 3. analysts were not able to decrypt the enciphered signal from the French embassy, but they noticed a faint secondary signal, which was the plain text. 1970s All about the title Emission Security vanished from the open literature. 1984 The secret service of GDR called MfS spied out the Ministry of Foreign Trade by eavesdropping the compromising emanations. 1985 The dutch researcher Wim van Eck published an unclassified paper of security risks of emanations from computer monitors. This paper caused consternation in the security community, where all thought, that those attacks were only possible with very high tech equipment. But Wim van Eck eavesdropped a system using just 15$ worth of equipment plus a television set. With this paper Emission Security came back to public attention. 1990s Many published research about Emission Security were made for example about Vulnerabilities of smart cards (Markus Kuhn and Ross Anderson 1996) and Vulnerabilities of crypto-systems (Paul Kocher). Kuhn and Anderson also published a paper showing that compromising emanations from PCs could be countered with measures in software. 1995 were also basic information of the TEMPEST standard published. Physical Backgrounds The strongest transmitters in PCs are displaying devices like graphic cards, video cables or monitors, because they work with high frequencies and they need much power. So the emanation of these devices is high energetically and it has high ranges. In addition are visual signals periodical (e.g. the output of visual memory of a graphic card is 70-100 times in one second). Periodic signals are easy to eavesdrop, because the noise can be reduced by middling. These components radiate in three frequency bands: - The vertical diverting signal works in lower kHz band. - The horizontal diverting signal works in lower MHz band (Long and medium wave). - The video signal has frequencies up to 100 MHz The diverting signals are very easy to eavesdrop and reconstruct, but they contain no important information like the video signal. The video signal is an overlapping of sinus signals with different frequencies. Via fourier transformation is it possible to get the spectrum of the video signal which contain all information to reconstruct it. The spectrum is repeated at all multiples of the pixel cycle (reciprocal of time the electron ray needs to get from one pixel to his neighbor). So the information is also available at higher frequencies. This is called "upper waves". The intensity of upper waves depends on sharpness of the pixels.
  • 4. Video cable, power supply and amplifier of monitors work like antennas especially for upper waves. But not all information’s can be reconstructed from emanations. Letters produce a wide band signal because of their thin vertical lines. Texts contain many redundancy because they use only a subset of all possible pixel-patterns. So Texts are easy to reconstruct. But there is no procedure known to rebuild color information. So pictures are difficult to reconstruct. Attacks Video Display Units In the early 80's the Dutch PTT (Post, Telephone, and Telegraph) has tested monitors and keyboards connected to telephone lines in homes for sending and receiving mail. During the tests some users complained about interference from their neighbor's units. Several persons were able to read a neighbor's mail as the neighbor viewed electronic mail on the screen at home. Wim Van Eck at the Dr. Neher Laboratories was assigned the task of developing an inexpensive detection unit to monitor RF electromagnetic radiation to evaluate monitors to help with installation problems. It was considered very difficult to reconstruct the data hidden in the radiated field, only possible for professionals with access to very sophisticated detection and decoding equipment. Van Ecks research proofed this to be wrong. He made a demonstration with material for less than $220, based on a modified TV set. The structure of the video signal shows remarkable resemblance to a normal broadcast TV signal. The pixel rate may even be located inside the TV broadcast bonds, only the synchronization information is missing and has to be reconstructed. The signal is emitted by the CRT itself and by the cable connecting the display with the hardware generating the image. As a result even LCD displays are sensitive to the attack. Try out Tempest for Eliza to see that this is more than theory. [Eck1985] Keyboard Acoustic Emanations The sound of clicks produced when typing on a PC keyboard can differ slightly from key to key, although the clicks of different keys sound very similar to the human ear. A neural network can be trained to differentiate the keys to successfully carry out an attack. The keyboard plate acts like a drum, and each key hit the drum in a different location and produces a unique frequency or sound that the neural networking software can decipher. The attack is very cheap. All you need is a computer, standard software to record the clicks and to train a neural network (available for free - read the paper) and a microphone.
  • 5. The attack is simple. It is non-invasive - no physical intrusion into the system is needed and the quality of the sound is not very important. It can be recorded from substantial distance (even with a cell phone). [Asonov2004] Radiation from RS-232 Cables Experiments on eavesdropping RS-232 cable signals prove that it is possible to intercept data signals running along an RS-232 cable, by picking up and decoding the electromagnetic radiation produced by the cable. The rise and fall times of the data signal are very short. Consequently, they correspond to high frequency components resulting in considerable radiation. In many cases, the RS-232 cables are not shielded, or the shield is not adequately connected to the equipment. Usually, the data is coded in well-known character sets, like ASCII. The interception-distance is limited to several meters, but the needed equipment is small, simple and cheap: a pocket radio receiver, a tape recorder and a computer to analyze the data. [Smulders1990] Countermeasures Countermeasures against bugs Certainly the compromising emanations can be eavesdropped in passive ways, but often the eavesdropper cannot get close enough for long time to get all information from an IT- device he needs. So he will use bugs, which reinforce these signals. There are some countermeasures against bugs, but they all have disadvantages. First of all is it possible to use "non linear junction detectors" to find hidden electronic equipment at close range. It works because the transistors, diodes, and other nonlinear junctions in electronic equipment have the effect of rectifying incident radio frequency signals. The device broadcasts a weak radio signal, and listens for harmonics of this signal. However, if the bugs were planted near other electronics then the nonlinear junction detector is not much help. Secondly there are some "surveillance receivers" on the market. This one detect conspicuous signals in the radio spectrum between 10 kHz and 3 GHz, which cannot be explained as broadcast, police, air traffic control and so on. But there are bugs which operate on same frequencies and protocols like mobile phones. The most drastic countermeasure is to build the buildings completely shielded or underground. In that case are bugs useless because their signals won’t get outside. This solution is sometimes used for military organizations. Countermeasures against emanation Without doubt the best solution is to place sensitive devices in a Faraday cage. That means that the room is completely shielded and no wires (e.g. power supply or telephone) and no pipelines (e.g. for heating) should get outside.
  • 6. A good base is to do red/black separation. Red equipment (carrying confidential data) has to be isolated from black equipment (sends signals to outside world). But some devices are red and black (e.g. crypting machines). Another problem is, that the standards for properly shielded hardware are classified. Only a few firms produce this hardware in small quantities. unnecessary to mention that this hardware is very expensive. Another way is the Zone Model. The Zone Model takes into account the propagation conditions for compromising emanations. The attenuation of radiation from IT device to the potential receiver is determined by metrological means. Basing on that the environment is divided in security-critical Zones. Siemens offers zone0-devices, which have very low emanation (not possible to eavesdrop outside the closed zone called zone0). Zone0-devices must be registered with the BSI (Bundesamt fĂĽr Sicherheit in der Informationstechnik). They cost tenfold more than comparable devices without this standard. One word on Jammers: Jammers are inefficient, because their strength is restricted by German law. In addition can the signals of jammers calculated out by eavesdropper after observing it for several time, if the jammers signal is not correlated with the other signals. A much cheaper and efficient solution is "Soft Tempest". Soft Tempest is based on the work by Markus Kuhn and Ross Anderson and uses software techniques to filter, mask, or render incomprehensible the information bearing electromagnetic emanations from a computer system. For example is it possible to remove the top 30% of Fourier transform of a standard font with a low-pass-filter. The user dont notice that but the eavesdropper is dependent on these "upper waves". Figures 15.4 and 15.5 display photographs of the screen with the two video signals from Figures 15.2 and 15.3. The difference in the emitted RF is dramatic, as illustrated in the photographs in Figures 15.6 and 15.7. These show the potentially compromising emanations, as seen by a Tempest monitoring receiver. Passive Attacks That is, attacks in which the opponent makes use of whatever electromagnetic signals are presented to him without any effort on her part to create. Broadly speaking, there are two categories. The signal can either be conducted over some
  • 7. kind of circuit (such as a power line or phone line) or it may be radiated as radio frequency energy. These two types of threat are referred to by the military as Hijack and Tempest, respectively. They are not mutually exclusive; RF threats often have a conducted component. For example, radio signals emitted by a computer can be picked up by the mains power circuits and conducted into neighboring buildings. Still, it’s a reasonable working classification most of the time. Type of Passive attack: 1-Leakage through Power and Signal Cables 2-Leakage through RF Signals Active Attacks But it’s not enough to simply encrypt a keyboard scan pattern to protect it, as the attacker can use active as well as passive techniques. Against a keyboard, the technique is to irradiate the cable with a radio wave at its resonant frequency. Thanks to the nonlinear junction effect, the keypress codes are modulated into the return signal, which is reradiated by the cable. This can be picked up at a distance of 50 to 100 yards. To prevent it, one must also encrypt the signal from the keyboard to the PC. Type of Passive attack: 1-Tempest Viruses 2- Nonstop Commercial Exploitation Not all Emses attacks are conducted in the context of covert military surveillance or Laboratory attacks on tamper-resistant devices. I already mentioned the TV detector vans used in Britain to catch TV license defaulters and the customers of pay-TV pirates. There are also marketing applications. U.S. venue operator SFX Entertainment monitors what customers are playing on their car radios as they drive into venue parking lots by picking up the stray RF from the radio’s local oscillator. Although legal, this alarms privacy advocates [728]. The same equipment has been sold to car dealers, mall operators, and radio stations. Defenses The techniques that can be used to defend smartcards against active Emsec threats are Similar, though not quite the same, to those used in the passive case. Timing randomness—jitters—is still useful, as a naive opponent might no longer Know precisely when to insert the glitch. However, a clever opponent may well be able to analyze the power curve from the processor in real time, and compare it against the code so as to spot the critical target instructions. In addition, fault attacks are hard to stop with jitter, as the precise location of the fault in the code is not usually critical. In some cases, defensive programming is enough. For example, the PIN search described
  • 8. in Section 15.5.5 is prevented in more modern implementations by decrementing the counter, soliciting the PIN, then increasing the counter again if it’s correct. Differential fault attacks on public key protocols can be made a lot harder if you just check the result. Other systems use specific protective hardware, such as a circuit that integrates the card reset with the circuit that detects clock frequencies that are too high or too low. Normal resets involve halving the clock frequency for a few cycles, so an attacker who found some means of disabling the monitoring function would quite likely find himself unable to reset the card at all on power-up . Current defenses against glitch attacks are not entirely foolproof, and extensive device testing is highly advisable. New technologies, such as the use of self-timed logic, may improve things by providing a high level of protection against both active and passive threats. In the meantime, if you have to write a smartcard application, attacks based on glitching merit careful consideration. How Serious Are Emsec Attacks? Technical surveillance and its countermeasures are the most important aspect of Emsec, in both government and industry; they are likely to remain so. The range of bugs and other surveillance devices that can be bought easily is large and growing. The motivation for people to spy on their rivals, employees, and others will continue. If anything, the move to a wired world will make electronic surveillance more important, and countermeasures will take up more of security budgets. Those aspects of Emsec that concern equipment not designed for surveillance— Tempest, Teapot, Hijack, Nonstop, and the various types of power and glitch attack—are set to become another of the many technologies that were initially developed in the government sector but then start being important in the design of commercial Products. Governments The Emsec threats to embassies in hostile countries are real. If your country is forced by the president of Lower Slobovia to place its embassy in the second floor of an office block whose first and third floors are occupied by the local secret police, then security is an extremely hard problem. Shielding all electronic equipment (except that used for deception) will be part of the solution. In less threatening environments, the use of hardware Tempest shielding is more doubtful. Despite the hype with which the Tempest industry maintained itself during the Cold War, there is growing scepticism about whether any actual Tempest attacks had ever been mounted by foreign agents, though anecdotes abound. It’s said, for example, that the only known use of such surveillance techniques against U.S. interests in the whole of North America was by Canadian intelligence personnel, who overheard U.S. diplomats discussing the U.S. bottom line in grain sales to China; and that the East German
  • 9. Stasi were found to have maps of suitable parking places for Tempest vans in West German towns. But I’ve not found anything that can be nailed down to a reliable source, and having been driven around an English town looking for Tempest signals, I can testify that launching such attacks is much harder in practice than it might seem in theory. Governments now tend to be much more relaxed about Tempest risks than 10 years ago. Businesses In the private sector, the reverse is the case. The discovery of fault attacks, and then power attacks, was a big deal for the smartcard industry, and held up for probably two years the deployment of smartcards in banking applications in those countries that hadn’t already committed to them. Blocking these attacks turns out to be difficult, and doing it properly will involve a further generation of hardware design. And what about the future? The “no security” aspects of emission management, namely RFI/EMC, are becoming Steadily more important. Ever higher clock speeds, plus the introduction of all sorts of wireless devices and networks, and the proliferation of digital electronics into many Devices that were previously analogue or mechanical, are making electromagnetic Compatibility a steadily harder and yet more pressing problem. Different industry groups, manage a host of incompatible standards many of which are rapidly becoming Obsolete—for example, by not requiring testing above 1 GHz, or by assuming protection distances that are no longer reasonable . On the security side, attacks are likely to become easier. The advent of software radios— radios that digitize a signal at the intermediate frequency stage and do all the demodulation and subsequent processing in software—were, until recently, an expensive military curiosity , but are now finding applications in places like cellular radio base stations. The next generation may be consumer devices, designed to function as GPS receivers, GSM phones, radio LAN base stations, and to support whatever other radio-based services have been licensed locally—all with only a change in software. Once people learn how to program them, they might just as easily use them for Tempest attacks. Finally, Emsec issues are not entirely divorced from electronic warfare. As society becomes more dependent on devices that are vulnerable to strong radio frequency signals such as the high-power microwaves generated by military radars the temptation
  • 10. Side Channel Attack In cryptography, a side channel attack is any attack based on information gained from the physical implementation of a cryptosystem, rather than theoretical weaknesses in the algorithms (compare cryptanalysis). For example, timing information, power consumption, electromagnetic leaks or even sound can provide an extra source of information which can be exploited to break the system. Many side-channel attacks require considerable technical knowledge of the internal operation of the system on which the cryptography is implemented. Attempts to break a cryptosystem by deceiving or coercing people with legitimate access are not typically called side-channel attacks: see social engineering and rubber-hose cryptanalysis. For attacks on computer systems themselves (which are often used to perform cryptography and thus contain cryptographic keys or plaintexts), see computer security. General General classes of side channel attack include: ď‚· Timing attack — attacks based on measuring how much time various computations take to perform. ď‚· Architectural side-effect attacks — attacks which take advantage of side-effects of performing a computation on a particular machine architecture (e.g., evicting cache lines). ď‚· Power monitoring attack — attacks which make use of varying power consumption by the hardware during computation. ď‚· TEMPEST (aka van Eck or radiation monitoring) attack — attacks based on leaked electromagnetic radiation which can directly provide plaintexts and other information. ď‚· Acoustic cryptanalysis — attacks which exploit sound produced during a computation (rather like power analysis). In all cases, the underlying principle is that physical effects caused by the operation of a cryptosystem (on the side) can provide useful extra information about secrets in the system, for example, the cryptographic key, partial state information, full or partial plaintexts and so forth. The term cryptophthora (secret degradation) is sometimes used to express the degradation of secret key material resulting from side channel leakage. Examples A timing attack watches data movement into and out of the CPU, or memory, on the hardware running the cryptosystem or algorithm. Simply by observing how long it takes
  • 11. to transfer key information, it is sometimes possible to determine how long the key is in this instance (or to rule out certain lengths which can also be crypt analytically useful). Internal operational stages in many cipher implementations provide information (typically partial) about the plaintext, key values and so on, and some of this information can be inferred from observed timings. Alternatively, a timing attack may simply watch for the length of time a cryptographic algorithm requires -- this alone is sometimes enough information to be cryptanalytically useful. A power monitoring attack can provide similar information by observing the power lines to the hardware, especially the CPU. As with a timing attack, considerable information is inferable for some algorithm implementations under some circumstances. As a fundamental and inevitable fact of electrical life, fluctuations in current generate radio waves, making whatever is producing the currents subject -- at least in principle -- to a van Eck (aka, TEMPEST) attack. If the currents concerned are patterned in distinguishable ways, which is typically the case, the radiation can be recorded and used to infer information about the operation of the associated hardware. According to former MI5 officer Peter Wright, the British Security Service analysed emissions from French cipher equipment in the 1960s. In the 1980s, Soviet eavesdroppers were known to plant bugs inside IBM Electric typewriters to monitor the electrical noise generated as the type ball rotated and pitched to strike the paper; the characteristics of those signals could determine which key was pressed. If the relevant currents are those associated with a display device (ie, highly patterned and intended to produce human readable images), the task is greatly eased. CRT displays use substantial currents to steer their electron beams and they have been 'snooped' in real time with minimum cost hardware from considerable distances (hundreds of meters have been demonstrated). LCDs require, and use, smaller currents and are less vulnerable -- which is not to say they are invulnerable. Also as an inescapable fact of electrical life in actual circuits, flowing currents heat the materials through which they flow. Those materials also continually lose heat to the environment due to other equally fundamental facts of thermodynamic existence, so there is a continually changing thermally induced mechanical stress as a result of these heating and cooling effects. That stress appears to be the most significant contributor to low level acoustic (i.e. noise) emissions from operating CPUs (about 10 kHz in some cases). Recent research by Shamir et al. has demonstrated that information about the operation of cryptosystems and algorithms can be obtained in this way as well. This is an acoustic attack; if the surface of the CPU chip, or in some cases the CPU package, can be observed, infrared images can also provide information about the code being executed on the CPU, known as a thermal imaging attack. Countermeasures Because side channel attacks rely on emitted information (like electromagnetic radiation or sound) or on relationship information (as in timing and power attacks), the most reasonable methods of countering such attacks is to limit the release of such information
  • 12. or access to those relationships. Displays are now commercially available which have been specially shielded to lessen electromagnetic emissions reducing susceptibility to TEMPEST attacks. Power line conditioning and filtering can help with power monitoring attacks, as can some continuous-duty UPSs. Physical security of hardware can reduce the risk of surreptitious installation of microphones (to counter acoustic attacks) and other micro-monitoring devices (against CPU power draw or thermal imaging attacks). Summary Emission security covers a whole range of threats in which the security of systems can be subverted by compromising emanations, whether from implanted bugs, from unintentional radio frequency or conducted electromagnetic leakage, or from emanations that are induced in some way. Although originally a concern in the national intelligence Community, Emsec is now a real issue for companies that build security products such as smartcards and cash machines. Many of these products can be defeated by observing stray RF or conducted signals. Protecting against such threats isn’t as straightforward as it might seem References: 1. Compromising Reflections -or- How to Read LCD Monitors around the Corner. 2. "A Network-based Asynchronous Architecture for Cryptographic Devices" by Ljubljana Spadavecchia 2005 in sections "3.2.3 Countermeasures", "3.4.2 Countermeasures", "3.5.6 Countermeasures", "3.5.7 Software countermeasures", "3.5.8 Hardware countermeasures", and "4.10 Side- channel analysis of asynchronous architectures". 3. "The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks" [1] by David Molnar, Matt Piotrowski, David Schultz, David Wagner (2005) 4. http://en.wikipedia.org/wiki/Van_Eck_phreaking 5. Public version of NACSIM 5000 http://cryptome.sabotage.org/nacsim- 5000.htm 6. How old is TEMPEST? 7. TEMPEST: a signal problem – The story of the discovery of various compromising radiations from communications and Comsec equipment, Cryptologic Spectrum, Vol. 2, No. 3, National Security Agency, Summer 1972, partially FOAI declassified 2007-09-27
  • 13. 8. Deborah Russell, G.T. Gangemi Sr.: Computer Security Basics. O'Reilly, 1991, ISBN 9780937175712, Chapter 10: TEMPEST, page 253 last paragraph. 9. Computers and Security, vol. 7, number 4 10.See "TEMPEST 101" and "TEMPEST and QinetiQ" under External Links. 11.http://www.eskimo.com/~joelm/tempest.html The Complete, Unofficial TEMPEST Information Page 12.TEMPEST Level Standards, SST web site 13.http://www.governmentattic.org/2docs/Hist_US_COMSEC_Boak_NSA_19 73.pdf Page 90 14.J. Loughry and D. A. Umphress. Information Leakage from Optical Emanations (.pdf file), ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pp. 262-289 15.Martin Vuagnoux and Sylvain Pasini Compromising radiation emanations of wired keyboards