• AI Search
  • Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Commerce

This Gadget Steals Encryption Keys And Is “Very Difficult” To Stop According to An Israeli Research

Paul Balo by Paul Balo
July 9, 2015
in Commerce, Research/How to do it, Security
Share on FacebookShare on Twitter

We live in a world where electronic spying is now almost a way of life. Individuals and governments alike are not exonerated. The excuse behind this governments of the world is security but imagine a world where this spying is being carried out by individuals with the sole purpose stealing your information in order to gain access to your personal data. Now that’s more scary. What if I were to tell you about a research carried out at the University of Tel Aviv where it was revealed that this gadget doesn’t use conventional techniques to steal encryption keys from your devices. Read all about it below;

Overview

We demonstrate the extraction of secret decryption keys from laptop computers, by nonintrusively measuring electromagnetic emanations for a few seconds from a distance of 50 cm. The attack can be executed using cheap and readily-available equipment: a consumer-grade radio receiver or a Software Defined Radio USB dongle. The setup is compact and can operate untethered; it can be easily concealed, e.g., inside pita bread. Common laptops, and popular implementations ofย RSAย andย ElGamalย encryptions, are vulnerable to this attack, including those that implement the decryption using modern exponentiation algorithms such as sliding-window, or even its side-channel resistant variant, fixed-window (m-ary) exponentiation.

We successfully extracted keys from laptops of various models runningย GnuPGย (popular open source encryption software, implementing theย OpenPGPย standard), within a few seconds. The attack sends a few carefully-crafted ciphertexts, and when these are decrypted by the target computer, they trigger the occurrence of specially-structured values inside the decryption software. These special values cause observable fluctuations in the electromagnetic field surrounding the laptop, in a way that depends on the pattern of key bits (specifically, the key-bits window in the exponentiation routine). The secret key can be deduced from these fluctuations, through signal processing and cryptanalysis.ย 

The attack can be mounted using various experimental setups:

  • Software Defined Radio (SDR) attack.ย We constructed a simple shielded loop antenna (15 cm in diameter) using a coaxial cable. We then recorded the signal produced by the probe using an SDR receiver. The electromagnetic field, thus measured, is affected by ongoing computation, and our attacks exploit this to extract RSA and ElGamal keys, within a few seconds.
    Electromagnetic measurement
  • Untethered SDR attack.ย Setting out to simplify and shrink the analog and analog-to-digital portion of the measurement setup, we constructed the Portable Instrument for Trace Acquisition (Pita), which is built of readily-available electronics and food items (see instructions here).ย Pitaย can be operated in two modes. Inย online mode, itย connects wirelessly to a nearby observation station via WiFi, and provides real-time streaming of the digitized signal. The live stream helps optimize probe placement and allows adaptive recalibration of the carrier frequency and SDR gain adjustments. Inย autonomous mode,ย Pitaย is configured to continuously measure the electromagnetic field around a designated carrier frequency, and records the digitized signal into an internal microSD card for later retrieval, by physical access or via WiFi. In both cases, signal analysis is done offline, on a workstation.
    Untethered Attack
  • Consumer radio attack.ย Despite its low price and compact size, assembly of theย Pitaย device still requires the purchase of an SDR device. As discussed, the leakage signal is modulated around a carrier circa 1.7 MHz, located in the range of the commercial AM radio frequency band. We managed to use a plain consumer-grade radio receiver to acquire the desired signal, replacing the magnetic probe and SDR receiver. We then recorded the signal by connecting it to the microphone input of an HTC EVO 4G smartphone.
radio attack

Q&A

Q1: What information is leaked by the electromagnetic emanations from computers?

This depends on the specific computer hardware. We have tested numerous laptop computers, and found the following:

  • Inย almost all machines, it is possible to tell, with sub-millisecond precision, whether the computer is idle or performing operations.
  • On many machines, it is moreover possible to distinguish different patterns of CPU operations and different programs.
  • Usingย GnuPGย as our study case, we can, on some machines:
    • distinguish between the spectral signatures of different RSA secret keys (signing or decryption), and
    • fully extract decryption keys, by measuring the laptop’s electromagnetic emanations during decryption of a chosen ciphertext.

A good way to visualize the signal is as a spectrogram, which plots the measured power as a function of time and frequency. For example, in the following spectrogram (recorded using theย first setup pictured above), time runs vertically (spanning 2.1 seconds) and frequency runs horizontally (spanning 1.6-1.75 MHz).ย  During this time, the CPU performs loops of different operations (multiplications, additions, memory accesses, etc.). One can easily discern when the CPU is performing each operation, due to the different spectral signatures.

various CPU operations

Q2: Why does this happen?

Different CPU operations have different power requirements. As different computations are performed during the decryption process, different electrical loads are placed on the voltage regulator that provides the processor with power. The regulator reacts to these varying loads, inadvertently producing electromagnetic radiation that propagates away from the laptop and can be picked up by a nearby observer. This radiation contains information regarding the CPU operations used in the decryption, which we use in our attack.

Q3:ย How can I construct such a setup?

  • Software Defined Radio (SDR) attack.ย The main component in theย first setupย is aย FUNcube Dongle Pro+ย SDR receiver.ย Numerous cheap alternatives exist, including “rtl-sdr’‘ USB receivers based on the Realtek RTL2832U chip (originally intended for DVB-T television receivers) with a suitable tuner and upconverter; theย Soft66RTL2 dongleย is one such example.
  • Untethered SDR attack.ย Theย Pitaย deviceย uses an unshielded loop antenna made of plain copper wire, wound into 3 turns of diameter 13 cm, with a tuning capacitor chosen to maximize sensitivity at 1.7 MHz (which is where the key-dependent leakage signal is present). These are connected to the aforementionedย FUNcube Dongle Pro+ย SDR receiver. We control the SDR receiver using a small embedded computer, theย Rikomagic MK802 IV. This is an inexpensive Android TV dongle based on the Rockchip RK3188 ARM SoC. It supports USB host mode, WiFi and flash storage. We replaced the operating system with Debian Linux, in order to run our software, which operates the SDR receiver via USB and communicates via WiFi. Power is provided by 4 NiMH AA batteries, which suffice for several hours of operation.
    Pita Device
  • Consumer radio attack.ย We have tried many consumer-grade radio receivers and smartphones with various results. Best results were achieved using a “Road Master” brand consumer radio connected to the microphone jack of an HTC EVO 4G smartphone, sampling at 48 kHz, through anย adapter cable.ย The dedicated line-in inputs of PCs and sound cards do not require such an adapter, and yield similar results.

Q4: What is the range of the attack?

In order to extend the attack range, we added a 50dB gain stage using a pair of inexpensive low-noise amplifiers (Mini-Circuitsย ZFL-500LN+ย andย ZFL-1000LN+ย in series, 175$ total). We also added a low-pass filter before the amplifiers. With this enhanced setup, the attack can be mounted from 50 cm away. Using better antennas, amplifiers and digitizers, the range can be extended even further.

ย long-range attack

Q5: What if I can’t get physically close enough to the target computer?

There are still attacks that can be mounted from large distances.

  • Laptop-chassis potential, measured from theย far endย of virtually any shielded cable connected to the laptop (such as Ethernet, USB, HDMI and VGA cables) can be used for key-extraction, as we demonstrated in aย paper presented at CHES’14.
  • Acoustic emanations (sound), measured via a microphone, can also be used to extract keys from a range of several meters, as we showed in aย paper presented at CRYPTO’14.

Q6: What’s new since your previous papers?

  • Cheap experimental setup.ย The previous papers required either a long attack time (about an hour) when using inexpensive equipment, or a fast attack (a few seconds) but using an expensive setup. In this paper we achieve the best ofย both, presenting an experimental setup which extracts keys quickly while remaining simple and cheap to construct.
  • New cryptographic technique addressing modern implementations. In the previous papers we attacked the naive square-and-multiply exponentiation algorithm and the square-and-always-multiply variant (which reduces side-channel leakage). However, most modern implementations utilize faster exponentiation algorithms: sliding-window, or for better side-channel resistance,ย m-ary exponentiation. In this paper we demonstrate a low-bandwidth attack on the latter two algorithms, extracting their secret keys.

Q7: How can low-frequency (kHz) leakage provide useful information about a much faster (GHz) computation?

We use two main techniques.

  1. Leakage self-amplification.ย Individual CPU operations are too fast for our measurement equipment to pick up, but long operations (e.g., modular exponentiation in RSA and ElGamal) can create a characteristic (and detectable) spectral signature over many milliseconds. Using a suitably chosen ciphertext, we are able to use the algorithm’sย ownย code to amplify its own key leakage, creating very drastic changes, detectable even by low-bandwidth means.
  2. Data-dependent leakage.ย While most implementations (such as GnuPG) attempt to decouple the secret key from the sequence of performedย operations, theย operandsย to these operations are key-dependent and often not fully randomized. The attacker can thus attempt to craft special inputs (e.g., ciphertexts to be decrypted) to the cryptographic algorithm that “poison” the intermediate values inside the algorithm, producing a distinct leakage pattern when used as operands during the algorithm’s execution. Measuring leakage during such a poisoned execution can reveal in which operations the operands occurred, and thus leak secret-key information.For example, the figure presents the leakage signal (after suitable processing) of an ElGamal decryption. The signal appears to be mostly regular in shape, and each peak corresponds to a multiplication performed by GnuPG’s exponentiation routine. However, an occasional “dip” (low peak) can be seen. These dips correspond to a multiplication by a poisoned value performed within the exponentiation routine.ย 

    signal example

Q8: How vulnerable is GnuPG now?

We have disclosed our attack to GnuPG developers underย CVE-2014-3591, suggested suitable countermeasures, and worked with the developers to test them.ย GnuPG 1.4.19ย andย Libgcrypt 1.6.3(which underlies GnuPG 2.x), containing these countermeasures and resistant to the key-extraction attack described here, were released concurrently with the first public posting of these results.

Q9: How vulnerable are other algorithms and cryptographic implementations?

This is an open research question. Our attack requires careful cryptographic analysis of the implementation, which so far has been conducted only for the GnuPG 1.x implementation of RSA and ElGamal. Implementations using ciphertext blinding (a common side-channel countermeasure) appear less vulnerable.ย 

Q10: Is there a realistic way to perform a chosen-ciphertext attack on GnuPG?

GnuPG is often invoked to decrypt externally-controlled inputs, fed into it by numerous frontends, via emails, files, chat and web pages. Theย list of GnuPG frontendsย contains dozens of such applications, each of them can be potentially used in order to make the target decrypt the chosen ciphertexts required by our attack. As a concrete example,ย Enigmailย (a popular plugin to the Thunderbird e-mail client) automatically decrypts incoming e-mail (for notification purposes) using GnuPG. An attacker can e-mail suitably-crafted messages to the victims (using theย OpenPGPย andPGP/MIMEย protocols), wait until they reach the target computer, and observe the target’s EM emanationsย during their decryption (as shown above), thereby closing the attack loop. We have empirically verified that such an injection method does not have any noticeable effect on the leakage signal produced by the target laptop. GnuPG’s Outlook plugin, GpgOL also did not seem to alter the target’s leakage signal.

Q11: What countermeasures are available?

Physical mitigation techniques of electromagnetic radiation include Faraday cages. However, inexpensive protection of consumer-grade PCs appears difficult. Alternatively, the cryptographic software can be changed, and algorithmic techniques employed to render the emanations less useful to the attacker. These techniques ensure that the rough-scale behavior of the algorithm is independent of the inputs it receives; they usually carry some performance penalty, but are often used in any case to thwart other side-channel attacks. This is what we helped implement in GnuPG (seeย Q8).

Q12: Why software countermeasures? Isn’t it the hardware’s responsibility to avoid physical leakage?

It is tempting to enforce proper layering and decree that preventing physical leakage is the responsibility of the physical hardware. Unfortunately, such low-level leakage prevention is often impractical due to the very bad cost vs. security tradeoff: (1) any leakage remnants can often be amplified by suitable manipulation at the higher levels, as we indeed do in our chosen-ciphertext attack; (2) low-level mechanisms try to protect all computation, even though most of it is insensitive or does not induce easily-exploitable leakage; and (3) leakage is often an inevitable side effect of essential performance-enhancing mechanisms (e.g., considerย cache attacks).

Application-layer, algorithm-specific mitigation, in contrast, prevents the (inevitably) leaked signal from bearing any useful information. It is often cheap and effective, and most cryptographic software (including GnuPG and libgcrypt) already includes various sorts of mitigation, both through explicit code and through choice of algorithms. In fact, the side-channel resistance of software implementations is nowadays a major concern in the choice of cryptographic primitives, and was an explicit evaluation criterion in NIST’s AES and SHA-3 competitions.

Q13: What does the RSA leakage look like?

Here is an example of a spectrogram (which plots the measured power as a function of time and frequency) for a recording of GnuPG decrypting the sameย ciphertext using different randomly generated RSA keys:

spectrogram of multiple GnuPG RSA decryptions

In this spectrogram, the horizontal axis (frequency) spans ranges from 1.72 MHz to 1.78 MHz, and the vertical axis (time) spans 1.2 seconds. Each yellow arrow points to the middle of a GnuPG RSA decryption. It is easy to see where each decryption starts and ends. Notice the change in the middle of each decryption operation, spanning several frequency bands. This is because, internally, each GnuPG RSA decryption first exponentiates modulo the secret primeย pย and then modulo the secret primeย q, and we can actually see the difference between these stages. Moreover, each of these pairs looks different because each decryption uses a different key. So in this example, by simply observing electromagnetic emanationsย during decryption operations, using the setup fromย this figure, we can distinguish between different secret keys.

Q14: What is the difference between your attack and the recent cache attack by Yarom et al.?

Cache side channel (timing cross-talk between processes or virtual machines) apply to scenarios where the attacker can execute code on the same physical machine as the targeted process (e.g., in shared computers, such as Infrastructure as a Service cloud computing).

Our attack exploitsย physicalย information leakage from computation devices, and does not require the attacker to execute his own code on the intended target.


Acknowledgments

We thankย Werner Koch, lead developer of GnuPG, for the prompt response to our disclosure and the productive collaboration in adding suitable countermeasures.ย Erik Olson’sย Baudlineย signal analysis software was used for some of the analysis.

This work was sponsored by theย Check Point Institute for Information Security; by theย European Union’s Tenth Framework Programmeย (FP10/2010-2016) under grant agreement 259426 ERC-CaC; by the Leona M. & Harry B. Helmsley Charitable Trust; by theย Israeli Ministry of Science and Technology; by theย Israeli Centers of Research Excellence I-CORE Programย (center 4/11); and byNATO’s Public Diplomacy Divisionย in the Framework of “Science for Peace”.


Related Posts:

  • 1200x675_cmsv2_5b73bfac-4817-58b5-a7aa-bc44740daa54-9020980
    DeepSeek AI Soars in Popularity, but Privacy Flaws…
  • VoidProxy_adminPanel_Login
    VoidProxy Targets Microsoft 365 & Google Accounts
  • Telegram–1424×802
    Telegram to Exit Markets Demanding Encryption Backdoors
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts
  • blog-a-lurking-npm-package
    Malicious npm Package Compromises WhatsApp Accounts
  • English_WhatsApp_passkey-encrypted-backups-1
    WhatsApp Adds Passkey Protection for Encrypted Backups
  • Robotics
    Nigeria Ranked As Africaโ€™s Second Most Cyber-secure…
  • twostep
    Google Sign in Will Require 2FA Verification

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: bugscyber securitysecuritysolar impulse 2solar powerwindtalkerwynk
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • OpenAI Moves Beyond Nvidia Chips in AI Arms Race February 3, 2026
  • SpaceX Acquires xAI in Major Strategic Move February 2, 2026
  • UK Launches Fuel Finder API for Petrol Station Prices February 2, 2026
  • France Signals Possible VPN Restrictions Amid Under-15 Social Media Ban February 2, 2026
  • Samsung Galaxy Unpacked 2026: What to Expect From the Galaxy S26 February 2, 2026
  • OpenAI Launches Standalone Codex App for macOS February 2, 2026
  • Uber exits Tanzania after Years of Regulatory Tension February 2, 2026
  • SpaceX Proposes Launch of One Million Solar Data Center Satellites February 2, 2026
  • Microsoft Resolves Outlook Encryption Access Issue February 2, 2026
  • Kuda Eyes Hybrid Banking With New National Licence February 2, 2026
  • Microsoft To Turn Off NTLM By Default In Future Windows February 1, 2026
  • Free YouTube Background Play: Google Confirms Crackdown February 1, 2026

Browse Archives

February 2026
MTWTFSS
 1
2345678
9101112131415
16171819202122
232425262728 
« Jan    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

ยฉ 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.