Tag Archive for: keys

New attack steals e-mail decryption keys by capturing computer sounds

In this photograph, (A) is a Lenovo ThinkPad T61 target, (B) is a Brüel&Kjær 4190 microphone capsule mounted on a Brüel&Kjær 2669 preamplifier held by a flexible arm, (C) is a Brüel&Kjær 5935 microphone power supply and amplifier, (D) is a National Instruments MyDAQ device with a 10 kHz RC low-pass filter cascaded with a 150 kHz RC high-pass filter on its A2D input, and (E) is a laptop computer performing the attack. Full key extraction is possible in this configuration, from a distance of 1 meter.
Genkin, Shamir, and Tromer

Computer scientists have devised an attack that reliably extracts secret cryptographic keys by capturing the high-pitched sounds coming from a computer while it displays an encrypted message.

The technique, outlined in a research paper published Wednesday, has already been shown to successfully recover a 4096-bit RSA key used to decrypt e-mails by GNU Privacy Guard, a popular open source implementation of the OpenPGP standard. Publication of the new attack was coordinated with the release of a GnuPG update rated as “important” that contains countermeasures for preventing the attack. But the scientists warned that a variety of other applications are also susceptible to the same acoustic cryptanalysis attack. In many cases, the sound leaking the keys can be captured by a standard smartphone positioned close to a targeted computer as it decrypts an e-mail known to the attackers.

“We devise and demonstrate a key extraction attack that can reveal 4096-bit RSA secret keys when used by GnuPG running on a laptop computer within an hour by analyzing the sound generated by the computer during decryption of chosen ciphertexts,” the researchers wrote. “We demonstrate the attack on various targets and by various methods, including the internal microphone of a plain mobile phone placed next to the computer and using a sensitive microphone from a distance of four meters [a little more than 13 feet].”

Read 6 remaining paragraphs | Comments


    




Ars Technica » Technology Lab

CryptoSeal VPN shuts down rather than risk NSA demands for crypto keys

Mayhem Chaos

A consumer VPN service called CryptoSeal Privacy has shut down rather than risk government intrusions that could cost the company money in legal fees and threaten user privacy.

CryptoSeal will continue offering its business-focused VPN, but the consumer service is done, the company announced:

With immediate effect as of this notice, CryptoSeal Privacy, our consumer VPN service, is terminated. All cryptographic keys used in the operation of the service have been zerofilled, and while no logs were produced (by design) during operation of the service, all records created incidental to the operation of the service have been deleted to the best of our ability.

Essentially, the service was created and operated under a certain understanding of current US law, and that understanding may not currently be valid. As we are a US company and comply fully with US law, but wish to protect the privacy of our users, it is impossible for us to continue offering the CryptoSeal Privacy consumer VPN product.

VPN services let consumers gain extra privacy and security while using the Internet. A user establishes an encrypted connection with a VPN service, routing all Internet traffic to the VPN before sending it on to the rest of the Internet.

Read 10 remaining paragraphs | Comments


    




Ars Technica » Technology Lab

Google builds bigger crypto keys to make site forgeries harder – Ars Technica


Ars Technica

Google builds bigger crypto keys to make site forgeries harder
Ars Technica
The Flame espionage malware that targeted Iran wielded a never-before-seen collision attack to hijack Microsoft's Windows Update mechanism. Researchers have estimated that the SHA1 algorithm, which is considered more resistant to collision attacks and

and more »

flame malware – read more

Korean Cyberwarfare Update: Leaving The Keys In The Car – American Thinker (blog)

Korean Cyberwarfare Update: Leaving The Keys In The Car
American Thinker (blog)
Korean news source Chosun Ilbo reports that "An official (South Korean) investigation has concluded that North Korea was behind a massive cyber attack that paralyzed the computer networks of broadcasters and banks on March 20." The "fingerprints" (IP

cyber warfare – read more