The antenna was detecting radio signals "leaking" from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.
"[This] antenna is not supposed to work at this frequency, and it's been in someone's attic for years and is a bit bent," said Kenworthy, a principal engineer at Cryptography Research. "You could build an antenna into the side of a van to increase your gain—well, now you've gone from 10 feet to 300 feet."
Kenworthy and Benjamin Jun, Cryptography Research's chief technology officer, also demonstrated how a loop of wire held close to two models of smart phone could pick up their secret keys. The signal from an HTC Evo 4G smart phone was a direct transcript of the device's key, used as part of a common cryptographic algorithm called RSA. The researchers required a more complex statistical analysis to successfully capture a key from another HTC device, which was used as part of an encryption scheme known as AES.
Jun said that all the devices his company has tested produced signals of some kind that could betray their keys, although different eavesdropping techniques were necessary for different devices. While some could be vulnerable to a long-range attack, as in the iPod demonstration, others like the HTC devices would require an attacker to get up close. But that could be practical, said Jun, if contactless receivers used to collect payments from phones with NFC chips were modified by crooks. NFC chips are expected to become widely available in smart phones in coming months as Google and other companies develop contactless mobile payment systems.
The apps used in Jun and Kenworthy's demonstrations were of their own design, because it would be "bad manners" to demonstrate sniffing keys from other company's apps, said Jun. However, the researchers have shown privately that they can eavesdrop on encryption keys from any app or mobile software, he said.
0 comments
Post a Comment