Calendar
  • No events
AEC v1.0.4

Cyber Security Info
@Cybersecurityinfo

Attack capable of retrieving encryption key by capturing computer sound

December 19, 2013

Share Button

Three Israeli experts have published a paper proving ability to retrieve encryption keys from the computer by analyzing its sound while performing decryption. It is another example of so called s The attack may be practically implemented for example by placing smartphone next to the targeted machine which makes much easier that previously known side channel attacks such as monitoring processor load, power supply or electromagnetic emanation.

Source: ArsTechnica

Share Button

Comments