Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
Security Technology

Breaking RSA Keys by Listening to Your Computer 186

An anonymous reader writes "Adi Shamir and crew gave a talk on preliminary results in extracting a private RSA key just by listening to the computer!. Similar to power analysis and LED leakage, this is a non-invasive, side channel attack that may have applications to tamper-resistant systems. It appears to be related to noisy capacitors on the motherboard, an effect which has been observed when CPU power saving is enabled on laptops."
This discussion has been archived. No new comments can be posted.

Breaking RSA Keys by Listening to Your Computer

Comments Filter:
  • No (Score:5, Informative)

    by Transient0 ( 175617 ) on Saturday May 08, 2004 @12:25PM (#9094012) Homepage
    at best, they have shown that they can detect differences in the types of instructions the processor is executing by listening to the sounds of the capacitors. It is a long way from there to the point where they can extract the key itself from the information. In fact, I would venture that the data is far too noisy (haha) for any significant part of the key to ever be extracted, reagardless of the amount of computational power thrown at the problem. What they might be able to do however is use the information gleaned to eliminate large swaths of the set of possible keys. This could make cracking the key by conventional means a computationally easier task.

    So, in all, this paper is not insignificant, but it's also not a reason to completely give up on security or to install a cone of silence around your computer.
  • by LostCluster ( 625375 ) * on Saturday May 08, 2004 @12:32PM (#9094060)
    Even if the FBI/NSA can't manage to decode your data, the fact remains if they get to look at your HD via a warrent and they discover 20 GB of encrypted data rather than anything readable, they know you're hiding something from their view.

    That discovery encrypted data can still be used as evidence in justifying further warrants... while discovering 20 GB of Britney Spears music in readable form would most likely cause the investigation to give up on worrying about the contents of that hard drive.
  • by suso ( 153703 ) on Saturday May 08, 2004 @12:41PM (#9094101) Journal
    This sounds kinda like that crack that the college student found in 1995 dealing with the speed of the CPU determining what random numbers the host would pick. A good reason not to keep your CPU info in the HINFO line of a DNS zone file.
  • by Anonymous Coward on Saturday May 08, 2004 @01:06PM (#9094219)
    Did you even read the article? This comes from before the pictures of the sounds, even, and I quote:

    The recordings below were made under nearly ideal conditions: the microphone was placed 20cm from the recorded computer, the PC case was opened and noisy fans were disconnected (where applicable). Comparable results where achieved under more realistic conditions (i.e., the subject computer is intact and placed 1m to 2m from the microphone) using more expensive audio equipment.
  • by Effugas ( 2378 ) on Saturday May 08, 2004 @01:06PM (#9094220) Homepage
    Shamir, once again pointing out something absolutely brilliant and (in retrospect) totally obvious, did forget to include something rather important in his announcement:

    The particular pattern of CPU operations executed while an RSA private key is executed varies depending on that RSA private key. Given a rough estimate of the pattern of CPU operations executed, the set of possible RSA private keys is greatly reduced. So it becomes much, much easier -- possibly trivial, particularly if you have a chosen plaintext scenario -- to extract a private key from an otherwise secure system. Consider an e-voting machine with an audio system for handicapped access -- with nothing but a very sensitive microphone in the booth, you might be able to determine the private key used to sign votes (and thus gain the capability to spoof votes elsewhere).

    And of course, this would be a very, very successful attack against an RSA private key embedded within a trusted computing environment. Processors -- even those encased in epoxy -- still need power, and variable amounts depending on what they're doing. The brilliance here is that rather than needing some very expensive analog energy drain measurement equipment, you just need a sound card. It's a side channel attack for the masses.

    Very very cool work. Wow.

    --Dan
  • by Doctor Wonky ( 105398 ) on Saturday May 08, 2004 @01:08PM (#9094231)
    What they did was, create tight loops performing the same operation over and over. And found that different operations tend to result in different sorts of noise on the power supply, resulting in different sounds from the capacitors.

    Remember though with their 96,000 Hz sampling rate, a 1 Ghz CPU performs over 10,000 instructions per sample.

    Air does not vibrate fast enough, and there are no microphones with frequency response high enough to let you look at individual operations.

    So I guess, if you knew the characteristics well enough, you could record the sound of the capacitors and say 'Hey, this guy is running GnuPG' on it. I don't see a concievable way to figure out the keys and this article doesn't suggest one.
  • by roosterx ( 739030 ) on Saturday May 08, 2004 @01:11PM (#9094255)
    I've heard of Tempest emanations/ Van Ecks for eavesdropping. Supposedly the technique can grab keystrokes from remote machies. Just google for "tempest eavesdropping" if you want info on this.
  • by tricops ( 635353 ) <.moc.oohay. .ta. .1111spocirt.> on Saturday May 08, 2004 @01:35PM (#9094353)
    I used to have that problem. I have an extension jack for the speaker out and mic at the front of my case.

    One day when I had the case open and was moving stuff around, I noticed it made noise whenever I bumped the cable for said jacks. Once removed, the noise went away.... probably not the same thing in your case, but gotta love unshielded cables.
  • No no (Re:No) (Score:5, Informative)

    by po8 ( 187055 ) on Saturday May 08, 2004 @01:39PM (#9094376)

    Uh, no. Your analysis runs contrary to cryptanalytic principles and the history of these sorts of attacks.

    If you spot me 1 bit of key information, you have by definition halved the work for an attack. In this specific analysis, I need only consider those settings of key bits (in this case, bits of p and q) that correspond to observed behavior for an interval of the spectogram. This means that I can potentially crack the key in time almost linear in the size of the key, rather than completely exponential.

    The work on timing attacks and power attacks uses very similar sorts of information, and the anlysis used here will likely be similar also. This is why Shamir, who is certainly qualified to evaluate the work at this point, describes it as "proof of concept": it would be surprising if the observed information fails to extend to a practical attack. It's just that in science, you publish when you have anything interesting to report, so that folks know you got there first.

  • Well... (Score:2, Informative)

    by marcansoft ( 727665 ) <hector AT marcansoft DOT com> on Saturday May 08, 2004 @03:34PM (#9095054) Homepage
    Actually sound from computers can come from many places, and sometimes you han make out a hell of a lot of info about what a user is doing.

    Typical CPU HLT execution either by the O/S (linux and w2k or so i thought... w2k didn't do it too good when I tried it) or by an external program (on ring 0) e.g CpuIDLE will cause several things, from what I've experienced:

    Variable fan speed: Typical cheap comes-with-case power supplies regulate +5V whiwh surprise! gets a greater power draw when CPU is busy. Result, you fan sounds higher pitched when you ger a greater CPU load since +12V isn't regulated and the draw on +5V affects it. My newer power supply (old one died) doesn't seem to do this anymore, my old one, especillay with my old CoolerMaster fan (pretty noisy) was exceptionally good at this.

    Transformer/inductance/capacitor hum: when I turn off the main CPU fan you can distinguish some hums from several places in my pc, exclusind the power supply fan. Causes can be anything from sound being played thorugh some soundcard transformer to CPU drawing more power though something.

    Also, MANY other noises plague PCs:

    HDD head movement. I'm sure someone has developed a way to measure approximately what area of an hdd a user is accesing by listening to head noise.

    CDROM spinning/head moving/tracking/focussing. Wow do these 52x drives make a helluva lot of noise!

    Modem. Surely a mike placed next to the modem transformer could pick up the signal, and it then could easily be decoded to get the stream of PPP packets.

    speakers/soundcard. If I crack up the volume, depending on inputs selected, etc I can easily hear different noises, when I move a window, when I scroll something, etc they all make different noises/click rates. Of course it scares the hell out of me when someone IM's me through Jabber with that ding-dong noise.

    Take that and keyboard/mouse/CRT monitor/whatever noise and you have a wealth of information which you can use to predict what a user was doing.
  • FAQ (Score:5, Informative)

    by Insount ( 11174 ) * <slashdot2eran@@@tromer...org> on Saturday May 08, 2004 @05:37PM (#9095804) Homepage
    (I'm a co-author of the presentation.)

    The web page [weizmann.ac.il] was extended to include a FAQ discussing the issues brought up here.
  • by Gortbusters.org ( 637314 ) on Saturday May 08, 2004 @06:37PM (#9096165) Homepage Journal
    I get that on laptops a lot, especially this one Windows laptop. I get various feedback in the sound system based on what's happening (harddrive access vs CPU)
  • by Belsical ( 238668 ) on Saturday May 08, 2004 @10:21PM (#9097332) Homepage
    When I was about 6, my dad had a work laptop that he brought home. It had a grey-scale screen, dual 3.5" floppies, 4 (I think) MB of RAM, and no hard drive.

    The only things he had for it was WordPerfect and "Where in the World is Carmen Sandiago?" Based on the sound of the spinning drive, I could decipher which of the multiple choice answers was correct to move to the next stage while the current stage was loading. After a while, I started plugging my ears while a stage was loading so the game didn't suck.
  • by Anonymous Coward on Saturday May 08, 2004 @10:22PM (#9097338)
    The audio circuitry on my ASUS motherboard is such that I can hear the CPU activity through the speakers at the normal volume settings. And based on the sound, I can tell how much the cpu
    is idle. Apparently, it is when linux puts the CPU in a halt state that it makes the noise because if I do something CPU intensive (such as gzipping the kernel) it is actually quieter.

    In the old days, I used to listen to the RS-232 signals going to the terminal since they shared an output line on the CPU with the audio signals. I couldn't tell exactly what was being printed but I could definitely recognize patterns.

    Later, I discovered that I could hear when the pattern changed on an ordinary CRT monitor displaying text. It was possible to tell, with my back to the computer, when, for example, a compilation completed and whether or not it was successful.

    So, there are other possible low bandwidth audio leaks besides the one mentioned.

  • by Yggdrasil42 ( 662251 ) on Sunday May 09, 2004 @08:27AM (#9099310) Homepage
    In my case it started with mobo's with integrated audio. Even on low volume I can hear it clearly.

    Strange thing is that high cpu usage actually dampens the noise, so my solution was to run a distributed computing client (THINK, in my case, but others will do as well) to keep the cpu busy. Works perfectly, and I even forgot I had the problem until I read this post.

    I do think it's pretty lame that so many on-board audio chips have this problem.

This file will self-destruct in five minutes.

Working...