[6095] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DPA mapped to spectral analysis

daemon@ATHENA.MIT.EDU (David Honig)
Fri Nov 19 19:05:57 1999

Message-Id: <3.0.5.32.19991119153936.00812460@pop.sprynet.com>
Date: Fri, 19 Nov 1999 15:39:36 -0800
To: "Marcus Leech" <mleech@nortelnetworks.com>, cryptography@c2.net
From: David Honig <honig@sprynet.com>
In-Reply-To: <3835A8E4.49FB7B01@nortelnetworks.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 02:45 PM 11/19/99 -0500, Marcus Leech wrote:
>Has anyone considered experimenting with DPA (Differential Power
>Analysis), but
>  using spectral data, instead of power consumption?
>
>Different operations will produce different EM spectra, 

You have just reinvented the stuff TEMPEST tries to fight -
van Eck monitoring.  Monitors, RS232 lines, and PC busses
have been found to radiate well.

A while back someone on cypherpunks posted a program that would let you
hear FSK modulation on a normal radio when the program
was run, by modulating PCI traffic. 














  






home help back first fref pref prev next nref lref last post