[6097] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: DPA mapped to spectral analysis

daemon@ATHENA.MIT.EDU (Marcus Leech)
Sat Nov 20 12:21:30 1999

Message-ID: <3836A60B.6673F85D@nortelnetworks.com>
Date: Sat, 20 Nov 1999 08:45:47 -0500
From: "Marcus Leech" <mleech@nortelnetworks.com>
MIME-Version: 1.0
To: David Honig <honig@sprynet.com>, cryptography@c2.net
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

David Honig wrote:
> 
> You have just reinvented the stuff TEMPEST tries to fight -
> van Eck monitoring.  Monitors, RS232 lines, and PC busses
> have been found to radiate well.
> 
> A while back someone on cypherpunks posted a program that would let you
> hear FSK modulation on a normal radio when the program
> was run, by modulating PCI traffic.
> 
Yup, I'm well aware of Van Eck monitoring, having done Van Eck video
monitoring
  with a friend of mine about 15 years ago.  Since most smart cards are
not
  terribly well shielded, I wonder whether you could *in reality* use
Van Eck
  monitoring to do a DPA-like crack of DES as a result.


home help back first fref pref prev next nref lref last post