I read that a group of cryptology experts extracted a 4,096-bit RSA key from a laptop using a sound-based attack technique. Can you explain how a sound-based attack works, whether it is an enterprise threat, and what we can do to mitigate the risks?
It should be no surprise that even an enterprise inside a Faraday cage, buried in a vault with 10-foot concrete walls can be successfully attacked. While it seems far-fetched, enterprises with high security requirements may want to plan for attacks that use sound-based attack techniques. These organizations might also want to add another 10 feet of concrete and destroy any microphones, telephones or other devices with audio features to stop sound attacks. They may also want to generate their own power to prevent analysis of their power consumption.
Yes, I'm being facetious, but the truth is, this is among the latest high-concept attach techniques that certain organizations with government-level security requirements should at least be aware of. For all other enterprises, this proof-of-concept exploit is not something you need to address.
I'm not diminishing the research performed by Adi Shamir, one of the inventors of the RSA algorithm, or Daniel Genkin and Eran Tromer of Tel Aviv University. They were able to identify a weakness in an encrypted GnuPG email plug-in, Enigmail, where it was configured to decrypted email by default. They found that when a certain mathematical operation was performed, the computer would emit a detectable, high-pitched noise. The trio could then monitor for this noise using a cell phone or a high-quality microphone at up to roughly 13 feet away. This allowed them to extract a 4,096-bit RSA decryption key from a targeted laptop.
GnuPG has since patched the vulnerability, so enterprises should install the new version of the software. This particular attack technique also requires automated decryption to be enabled -- which is known to be higher risk -- so disabling automated decryption could also reduce the threat.
Ask the Expert!
Have a question about enterprise threats? Send it via email today! (All questions are anonymous.)
Dig deeper on Emerging Information Security Threats
Related Q&A from Nick Lewis, Enterprise Threats
Chameleon malware targets insecure wireless access points. Enterprise threats expert Nick Lewis explains how to defend against the malware.continue reading
The Zeus malware is threatening RTF security by embedding itself in the file, which is commonly seen as safer than other file formats such as PDFs. ...continue reading
Enterprise threats expert Nick Lewis explains how to detect and avoid one of the most advanced malware threats: The Mask.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.