Security Fundamentals Group TEMPEST Security Hidema Tanaka.

Slides:



Advertisements
Similar presentations
TECH SKILLS COMPUTER BASICS
Advertisements

Computer Parts There are many parts that work together to make a computer work.
Copyright © Allyn & Bacon 2008 POWER PRACTICE Chapter 3 Computers in the Learning Environment START This multimedia product and its contents are protected.
Chapter 6 Output p. 6.
Connecting to a computer Network Network interface Card (NIC) Connecting Devices Network Cables Wireless Networks Network Topology Network Operating System.
Computer Hardware Software Network Peripheral devices Input Breaking codes Modeling weather systems Mainframe Server System unit CPU Input Devices Data.
Types of Computers & Computer Hardware
Direct Attacks on Computational Devices
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
Spectrum analyser basics Spectrum analyser basics 1.
BRETT GIPSON PRESENTS CHAPTER 5. DESCRIBE INPUT Input devices translate words, sounds, images and actions that people understand into symbols that the.
S. Mandayam/ NDE/ Fall 99 Principles of Nondestructive Evaluation Shreekanth Mandayam Graduate / Senior Elective / Fall 1999
Principles of Information Technology
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Introduction ‘Have you ever played video games before? Look at the joystick movement. When you move the joystick to the left, the plane on the TV screen.
Lesson 2 Input, Output, and Processing
Bioelectromagnetics ECEN 5341/4341 Lecture 3 1. Environmental and Occupationally Encountered Electromagnetic Fields 2. The objective is to get a feel for.
COMPUTER SYSTEM.
Input and Output devices Input ports are connections at the back of a computer. Input devices are connected to these ports, for example, a keyboard which.
Multimedia Hardware Mac vs. PC
Computer Insides and Out Computer Basics 1.1. Basic Personal Computer System  A computer system consists of hardware and software components.  Hardware.
SOFTWARE.
A look at networking and its main components. NETWORK A network is a group of connected computers that allow people to share information and equipment.
Computer & Communications Systems Software Development Unit 1.
2-1 Physical Layer l Theoretical basis for data communications n Fourier analysis n distortion –by different attenuation rates of different frequency components.
Page 1 - © Richard L. Goldman Mainframe Networking ©Richard L. Goldman January 7, 2002.
AS Computing F451 F451 Data Transmission. What data is transmitted? Phone SMS Radio TV Internet.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
Semester One 2001/2002 Sheffield Hallam University1 What is a Computer? System for storage, processing, communication of information –Hardware refers to.
Computer and its components Computer Skills university of Palestine.
Computer Parts There are many parts that work together to make a computer work.
Chapter 4 Output.
Computer main parts. Hardware  It refers to all physical parts of a computer system.
Side Channel Attacks through Acoustic Emanations
Echelon › Developed by National Security Agency of USA. › A secret project to spy on people by tracing their messages. › To find out the terrorist activities.
COMPUTER MAIN PARTS HARDWARE Y SOFTWARE JORGE MARIO RESTREPO VALENCIA CESDE.
Computer A computer is an electronic machine that takes information, processes it,and stores it. Computers are made up of hardware ( monitor, tower, keyboard,
EMISSIONS SECURITY Elizabeth Eykman Supervisors:Stephen Gould & Matt Barrie.
Submitted By: PVS Soumya [2/4] Sai Nandini T [2/4] GNITS GNITS
The EM Side-Channel(s) Dakshi Agrawal Bruce Archambeault Josyula R Rao Pankaj Rohatgi IBM.
Electromagnetic Radiation from VDUs: An Eavesdropping Risk? Paul Shotbolt Article in “Computers and Security” Volume 4. Number 4.by Wim van Eck.
Input & Output Hardware Chapter 6 Taking Charge of Computing and Communications.
COMPUTER MAIN PART DANILO GARCÍA GONZÁLEZ TÉCNICO EN SISTEMAS.
Specialized Input and Output. Inputting Sound ● The microphone is the most basic device for inputting sounds into a computer ● Microphones capture sounds.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
In and Out are opposites. This is something to keep in mind when considering Input and Output. INPUT OUTPUT Ask: Does this device send information in?
Computer Basics Mr. Chu MPHS CIS 1.
General Computer Knowledge COE 201- Computer Proficiency.
Computer Parts There are many parts that work together to make a computer work.
Compromising Electromagnetic Emanations of Wired and Wireless Keyboards Presented By: Justin Rilling Written By: Martin Vuagnoux and Sylvain Pasini.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
In computing, an input device is a piece of computer hardware equipment used to provide data and control signals to an information processing system such.
Computer Parts There are many parts that work together to make a computer work.
GAN: remote operation of accelerator diagnosis systems Matthias Werner, DESY MDI.
Parts of a Computer. Two Basic Components of a Computer System Hardware Parts of the Computer System you can physically touch Software Computer Instructions.
Computer Hardware & Processing Inside the Box CSC September 16, 2010.
Unit Two Hardware Passage One. A short Introduction.
HDTV Test Process Improvement (TOSHIBA RF) Sponsor: Aaron Foster TOSHIBA America Consumer Products, Inc. Manufacturing Division Project Team: Josue Caballero,
Computer Parts There are many parts that work together to make a computer work.
Computer PARTS. What is hardware? The hardware are the parts of the computer itself including the Central Processing Unit (CPU), keyboards, monitors,
Quick Overview.  Input Devices  Keyboard  Pointing Devices  Scanner  Digital Camera  Microphone  CD-ROM/DVD-ROM  Video Capture Card.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
European Computer Driving Licence
7 INPUT AND OUTPUT CHAPTER
Efficient mitigation of RFI at radio astronomy observatories
COMPUTER BASICS Computer essentials 7-8.
Physical Layer Theoretical basis for data communications
Physical Layer Theoretical basis for data communications
Communication and the Internet
Principles of Information Technology
Presentation transcript:

Security Fundamentals Group TEMPEST Security Hidema Tanaka

Security Fundamentals Group Information leakage via electromagnetic emanation Electromagnetic wave, which is emanated unintentionally from running IT devices, contains information of processing signals from the devices. scanner color printer PC FAX multifunction machine

Security Fundamentals Group What is TEMPEST Reconstruction image by emanated electromagnetic wave target PC antenna Tempest receiver

Security Fundamentals Group Threat of information leakage from display image ・ There is a possibility that personal information on public information terminals stolen. ・ Screen design of public information terminal is very simple. (Universal design) ・ It is easy to reconstruct such simple display image by TEMPEST. ・ Human-interface can not be protected by crypto-technology. Target of TEMPEST e-voting systemATM system a serious threat on the information security !! Target of TEMPEST e-voting system Target of TEMPEST e-voting system ATM information

Security Fundamentals Group Principle of TEMPEST Very easy : almost same as TV but attacker needs some information of the target. TVTEMPEST known as “Channel”Reception frequencyunknown standard(e.g.NTSC)Synchronous frequency (reconstruction of image) depend on “target” (e.g. VESA for PC)

Security Fundamentals Group Activity of our group Signal generator Vertical/Horizontal synchronous frequency Receiver Monitor 1. Analysis: Which frequency? What information? Video signal Synchronous signals 2. Simplification: Effectiveness vs Cost (Reality of threat). 3. Countermeasure: New techniques.

To evaluate information in electromagnetic emanation quantitatively, it is important to monitor emanated signals from electronic instruments in more easy-to-use way and more easy to reconstitute way, then to analyze how information signal is contained in emanated signal. We propose the method to monitor electromagnetic signals emanated from PC (desktop PC) in more easy-to-use way and more easy to reconstitute way. Also we reconstitute information from monitoring results and evaluate it. Security Fundamentals Group Analysis 秘 秘 Analysis & evaluation

Security Fundamentals Group Our proposal system ・ Not need shield room --- We can get high S/N signal. ・ Experimental results can be re-produced. --- It does not depend on the environment. ・ data-processing is easy.

Security Fundamentals Group This result shows that we can monitor emanated electromagnetic signal corresponding to character line(1 ~ 7line) displayed on the monitor. We can reconstitute easily by the result from the proposed monitoring method, and also it is very easy-to-use. Monitor display image

Security Fundamentals Group We can reconstitute image by using signal processing. In this reconstitution result of monitor display image, we can read a character around 18 point.

Security Fundamentals Group Simplification of TEMPEST ・ High performance receiver (10 ~ 20 years ago, FSET 22 was a military model) ・ Real time image processing (such as Adobe Photoshop) ・ Hardware Amplification and noise canceller ・ Setting of synchronous frequency in 0.001[Hz] step ・ Very expensive ($100M or higher? I do not know.) Does attacker (such a pedestrian hacker) need such expensive machines ? Frequency range100[Hz] – 22[GHz] Frequency resolution0.1[Hz] Bandwidth10[Hz] – 500[MHz] Average noise level< 142 dBm Specification of FSET22

Security Fundamentals Group The answer is NO. Easy TEMPEST receiver ・ Receiver: AOR AR8600 mk2 with TV output about $800 ・ Signal generator: NF Wave Factory 1944B about $2000 ・ No image processing Performance ・ do not succeed from far away by antenna. But wire tap (power cable or LAN cable using a current probe) is ok. ・ Rough screen such as ATM interface is ok. Countermeasures are important and necessary.

Security Fundamentals Group Countermeasures We can already use some countermeasure products, cage special cable and connector/adapter Tempest PC (about $10,000) jamming machine … but they are too expensive and limited usage.

Security Fundamentals Group Kuhn and Anderson (Cambridge university), IH98 Top 30% of horizontal frequency spectrum of image Effective to Tempest attack Removing top 30 % of horizontal frequency spectrum of image The basic idea of the Tempest fonts New technique → Software solution “TEMPEST fonts”

Security Fundamentals Group Monitor display image Enlarged view of reconstruction image If we use common font, we can read a character in reconstruction image.

Security Fundamentals Group Monitor display image reconstruction image But, when we use proposed TEMEPST font, we are hard to read a character in reconstruction image. TEMPEST font generated by Fourier trans. and Gaussian.

Security Fundamentals Group Future works ・ Reconstruction of keyboard typing information via EM ⇔ “Keyboard acoustic emanation” (L.Lhuag et.al, CSS05) ・ EM side-channel cryptanalysis (IC card, RFID etc) ・ EM attack (small scale of E-Bomb) on IT devices e.g. Attack to LAN cable → packet error → DoS attack