Israel-based researchers said they’ve developed a cheaper and faster method to pull the encryption keys stored on a computer using an unlikely accomplice: pita bread.The new study builds on research into what can be learned from the electronic signals that waft from computers while performing computations, often referred to as side-channel attacks.By studying the electronic signals, researchers have shown it is possible to deduce keystrokes, figure out what application a person is using or discover the secret encryption keys used to encrypt files or emails. This latest work focuses on capturing the encryption keys for laptops running GnuPG 1.x, an open source encryption program using the RSA and ElGamal key encryption algorithms. The researchers said they’ve notified the developer of GnuPG, Werner Koch, of their research. The researchers built a device that could be concealed in pita bread that collects electromagnetic signals from 50 centimeters away.They dubbed the device PITA, which stands for Portable Instrument for Trace Acquisition. It consists of a copper unshielded loop antenna with a capacitor designed to pick up frequencies around the 1.7MHz range at which encryption key information leaks. With the signals collected on an internal microSD card, offline analysis can then be used to deduce the keys in just a few seconds.As part of the attack, the PITA device sends a few carefully-crafted ciphertexts, or encrypted content, to a computer. When the content is decrypted by a computer, it gives off observable electromagnetic signals.“The secret key can be deduced from these fluctuations, through signal processing and cryptanalysis,” they wrote.The researchers also built a second device to collect the signals. Since the 1.7MHz frequency is in the same range as AM radio, they used a commercial-grade radio receiver called the Road Master.“We then recorded the signal by connecting it to the microphone input of an HTC EVO 4G smartphone,” they wrote.It’s hard to defend against these kinds of side-channel attacks aside from making sure any suspicious aluminum foil packages containing pita bread are checked for electronic devices. However, electromagnetic signals can be blocked using Faraday cages, which are enclosures that use metal to dissipate electronic signals. Few people, however, work in windowless metal boxes. PC manufacturers are also unlikely to address the problem in their hardware since it’s just too expensive.Re-engineering the software is a better approach. Algorithms and software could be changed to ensure the leaked signals are not distributing useful information. Work is already under way to make such changes, the researchers wrote.“In fact, side-channel resistance of software implementations is nowadays a major concern,” the paper said.The paper was co-authored by Lev Pachmanov, Itamar Pipman and Era Tromer, all of Tel Aviv University; and Daniel Genkin who is associated with both the university and Technion. It will be presented at the Workshop on Cryptographic Hardware and Embedded Systems in Saint-Malo, France, in September. Related content how-to Using the apropos command on Linux By Sandra Henry-Stocker Apr 24, 2024 3 mins Linux news 2024 global network outage report and internet health check ThousandEyes tracks internet and cloud traffic and provides Network World with weekly updates on the performance of ISPs, cloud service providers, and UCaaS providers. By Ann Bednarz Apr 24, 2024 38 mins Internet Service Providers Network Management Software Cloud Computing news Accelsius offers liquid cooling without a data center retrofit NeuCool technology works with existing data center equipment and configuration. By Andy Patrizio Apr 24, 2024 3 mins Energy Efficiency Data Center news Nvidia supercomputers: new collegiate, research systems come online Georgia Tech's dedicated AI supercomputer is a cluster of 20 Nvidia HGX H100s; the DOE's Venado is the first large-scale system with Nvidia Grace CPU superchips deployed in the U.S. By Andy Patrizio Apr 24, 2024 3 mins Supercomputers Data Center PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe