Wednesday, January 29, 2014

Acoustic cryptanalysis

Check this out.

Maybe the most interesting part of this paper is the attack using just a mobile phone in 30 centimeter distance of victim laptop. This side channel attacks are one the most near to spying stuff things in cryptography. In the fifteenth question of the page, two documented real world acoustic attacks carried out by MI5 and some-not-mentioned-organisation in USA has been exampled.

There is also a wiki page for this attack.

No comments:

Post a Comment