[8428] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: NONSTOP Crypto Query

daemon@ATHENA.MIT.EDU (Steven M. Bellovin)
Fri Jan 12 15:38:46 2001

From: "Steven M. Bellovin" <smb@research.att.com>
To: John Young <jya@pipeline.com>
Cc: cryptography@c2.net
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Date: Fri, 12 Jan 2001 14:33:38 -0500
Message-Id: <20010112193342.534D535DC2@smb.research.att.com>

In message <200101121702.MAA07450@blount.mail.mindspring.net>, John Young write
s:
>
>This loops back to NONSTOP and the question of what may 
>be the signatures and compromising emanations of today's 
>cryptosystems which reveal information in ways that go beyond 
>known sniffers -- indeed, that known sniffers may divertingly 
>camouflage. 

Again going back to "Spycatcher", Wright described a number of other 
emissions.  For example, voices in a room could modulate the current 
flow through a telephone's ringer.  (This was, of course, back in the 
days of electromagnet-actuated ringers...)  One can also find signals 
corresponding to the plaintext superimposed on the output waveform of 
the ciphertext, and possibly see coupling to the power supply.  (One of 
the rules I've read:  "Step 1:  Look for the plaintext".)

I've seen brochures for high-grade encryptors that speak of "red-black 
separation" and separate power supplies for the two halves.


		--Steve Bellovin, http:/www.research.att.com/~smb




home help back first fref pref prev next nref lref last post