COMPUTING SCIENCE An Acoustic Side Channel Attack on Enigma
نویسندگان
چکیده
Breaking the encrypted message traffic from the German Enigma cipher machine was one of the key allied achievements of World War II, performed at Bletchley Park by a team led by Alan Turing. The work described in this paper was motivated by the historic significance of the Enigma, and the fact that we had the possibility of gaining access to one. This led to the realisation that it would be intellectually interesting to investigate the possible effectiveness of a "side-channel" attack on the machine that exploited the noise made by the act of typing the source plaintext. Much has been written on the cryptologic aspects and the historic impact of the Enigma, but we are unaware of any previous account of an investigation into its susceptibility to an acoustic side-channel attack. The Enigma keyboard differs greatly from a modern keyboard, and is particularly noisy, due to movements of one or more of the internal rotors and associated machinery in response to each key press. We applied state-ofthe-art signal processing and machine learning techniques to investigate the possibility of identifying the individual Enigma keys from the noises they made; the outcome was a demonstration that such identification could be reliably achieved with a success rate of 84% (as opposed to 3.8% by random guess), using a simple microphone and a personal computer. © 2015 Newcastle University. Printed and published by Newcastle University, Computing Science, Claremont Tower, Claremont Road, Newcastle upon Tyne, NE1 7RU, England. Bibliographical details TOREINI, E., RANDELL, B., HAO, F. An Acoustic Side Channel Attack on Enigma [By] E. Toreini, B. Randell, F. Hao Newcastle upon Tyne: Newcastle University: Computing Science, 2015. (Newcastle University, Computing Science, Technical Report Series, No. CS-TR-1455)
منابع مشابه
A Specialized Assault Adjacent to the Aes and Its Function to System Implementations
Algebraic side channel attack is a major technique to solve the ciphers and the various side channel attacks. A side channel attack is a type of attack based on information gathered from the application of a cryptosystem, relatively than brute force. Common classes of side channel attack comprise, Timing attack ,Power monitoring attack ,Acoustic cryptanalysis ,Differential fault analysis ,Data ...
متن کاملAttacks on Confidentiality of Additive Manufacturing Systems using Acoustic Side-Channel
Acoustics emanated from the additive manufacturing systems, such as 3D-printers, carry process information that can be used to breach the confidentiality of the system. Moreover, this is an example of a physical-to-cyber domain attack, where information gathered from the physical domain, such as acoustic side-channel of a 3D-printer, can be used to reveal information about the cyber domain (suc...
متن کاملAcoustic Side-Channel Attacks on Printers
We examine the problem of acoustic emanations of printers. We present a novel attack that recovers what a dotmatrix printer processing English text is printing based on a record of the sound it makes, if the microphone is close enough to the printer. In our experiments, the attack recovers up to 72 % of printed words, and up to 95 % if we assume contextual knowledge about the text, with a micro...
متن کاملA Sound for a Sound: Mitigating Acoustic Side Channel Attacks on Password Keystrokes with Active Sounds
Keyboard acoustic side channel attacks have been shown to utilize the audio leakage from typing on the keyboard to infer the typed words up to a certain degree of accuracy. Researchers have continued to improve upon the accuracy of such attacks by employing different techniques and attack vectors such as feature extraction and classification, keyboard geometry and triangulation. While research ...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کامل