Security Limits for Compromising Emanations
نویسنده
چکیده
Nearly half a century ago, military organizations introduced “Tempest” emission-security test standards to control information leakage from unintentional electromagnetic emanations of digital electronics. The nature of these emissions has changed with evolving technology; electromechanic devices have vanished and signal frequencies increased several orders of magnitude. Recently published eavesdropping attacks on modern flat-panel displays and cryptographic coprocessors demonstrate that the risk remains acute for applications with high protection requirements. The ultra-wideband signal processing technology needed for practical attacks finds already its way into consumer electronics. Current civilian RFI limits are entirely unsuited for emission security purposes. Only an openly available set of test standards based on published criteria will help civilian vendors and users to estimate and manage emission-security risks appropriately. This paper outlines a proposal and rationale for civilian electromagnetic emission-security limits. While the presented discussion aims specifically at far-field video eavesdropping in the VHF and UHF bands, the most easy to demonstrate risk, much of the presented approach for setting test limits could be adapted equally to address other RF emanation risks.
منابع مشابه
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The technique generally used to detect compromising emanations is based on a wide-band receiver, tuned on a specific frequency. However, this method ma...
متن کاملThe Designing of TEMPEST Security Testing Model
Computer and other digital electronic equipments can emit unintentional electromagnetic signals in the state of information processing. The compromising electromagnetic emanations allow eavesdroppers to reconstruct processed data at a distance that threatening the information security. As result all equipments handling confidential information do need TEMPEST security testing. This paper attemp...
متن کاملThe Search and Reconstruction of Compromising Emanations of Laser Printers in Three Media
In this paper, the emissions of a laser printer, which may process classified information, are investigated in the media of electromagnetic radiation (ER), Power Line Conductors (PLC), and Signal Line Conductors (SLC). First, the candidate frequency points of Compromising Emanations (CE) are examined in the frequency domain. Second, the emitted signal is AM-demodulated with the proper bandwidth...
متن کاملSide Channels, Compromising Emanations and Surveillance: Current and future technologies
Side channel attacks exploit implementation-specific information leakage to defeat cryptographic measures, usually designed to provide confidentiality. The majority of published attacks require physical possession or network access to the target device, and as such are not suitable for implementation by an attacker wishing to carry out a remote, passive and undetectable attack. Surveillance tec...
متن کاملSynchronization Clock Frequency Modulation Technique for Compromising Emanations Security
The security problem of screen image leakage on a display unit through electromagnetic radiation from several meters away has attracted wide interest by security researchers since van Eck wrote about this problem. To solve the problem, techniques for reducing the S/N ratio of emanating information by signal reduction and noise generation have been proposed as countermeasures. Different from the...
متن کامل