[6097] in cryptography@c2.net mail archive
Re: DPA mapped to spectral analysis
daemon@ATHENA.MIT.EDU (Marcus Leech)
Sat Nov 20 12:21:30 1999
Message-ID: <3836A60B.6673F85D@nortelnetworks.com>
Date: Sat, 20 Nov 1999 08:45:47 -0500
From: "Marcus Leech" <mleech@nortelnetworks.com>
MIME-Version: 1.0
To: David Honig <honig@sprynet.com>, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
David Honig wrote:
>
> You have just reinvented the stuff TEMPEST tries to fight -
> van Eck monitoring. Monitors, RS232 lines, and PC busses
> have been found to radiate well.
>
> A while back someone on cypherpunks posted a program that would let you
> hear FSK modulation on a normal radio when the program
> was run, by modulating PCI traffic.
>
Yup, I'm well aware of Van Eck monitoring, having done Van Eck video
monitoring
with a friend of mine about 15 years ago. Since most smart cards are
not
terribly well shielded, I wonder whether you could *in reality* use
Van Eck
monitoring to do a DPA-like crack of DES as a result.