He can steal your smart phone’s and tablet’s encryption keys

If you think that the encryption keys that your smart phone or tablet computer uses to protect data you want to keep others from accessing is secure, well … think again.

Crypto researchers have demonstrated that those encryption keys can be stolen using techniques that are not that difficult to assemble. Because I am very security conscious and like to pay close attention to matters of this nature, I felt I should bring it to your attention too. The article was originally published by Tom Simonite for Technology Review. The article goes like this:

At the RSA computer security conference last week, Gary Kenworthy of Cryptography Research held up an iPod Touch on stage and looked over to a TV antenna three meters away. The signal picked up by the antenna, routed through an amplifier and computer software, revealed the secret key being used by an app running on the device to encrypt data. An attacker with access to this key could use it to perfectly impersonate the device he stole it from—to access e-mail on a company server, for example.

The antenna was detecting radio signals “leaking” from the transistors on the chip inside the phone performing the encryption calculations. Transistors leak those signals when they are active, so the pattern of signals from a chip provides an eavesdropper a representation of the work the chip is doing. When Kenworthy tuned his equipment to look in the right place, a clear, regular pattern of peaks and troughs appeared on his computer screen. They could be seen to come in two varieties, large and small, directly corresponding to the string of digital 1s and 0s that make up the encryption key.

The signal from an HTC Evo 4G smart phone was a direct transcript of the device’s key, used as part of a common cryptographic algorithm called RSA. The researchers required a more complex statistical analysis to successfully capture a key from another HTC device, which was used as part of an encryption scheme known as AES.

Read the complete article here.

Related Posts

Anti SOPA/PIPA Protest: How it happened and what you can do The protest against Stop Online Piracy Act (SOPA) and Protect Intellectual Property Act (PIPA) has come and gone, but the fight is just getting starte...
Wikileaks Mirror Taken Down: Host Buckles Under Demands from Upstream Provider Wikileaks isn't the only site struggling to stay up these days because service providers are pulling their support. It appears that at least one perso...
Benefits of the MeeGo Software Platform The MeeGo open source project is unique in that it offers benefits to everyone in the ecosystem starting from the developer all the way up to the oper...
Who’s watching you? Ahead of terrorist attacks, becoming bankrupt and being attacked in their homes, people are more worried about their online privacy being violated and...
The MeeGo Progress Report: A+ or D-? The end of October saw the release of MeeGo 1.1, the second major milestone release of the platform since it burst onto the scenes in February 2010. T...
Is Microsoft buying Nokia? An analysis of the acquisition endgame The Elop and Ballmer duo on stage on February 11th was the main topic of discussion at this year’s Mobile World Congress. The reverberations of the Mi...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


  1. Pingback: رادیو گیک شماره ۲ – از فضا و فراسوی فضا « دگرگون

  2. Pingback: رادیو گیک شماره ۲ – از فضا و فراسوی فضا

  3. Pingback: Links 7/3/2012: NVIDIA Joins Linux Foundation, Android Easily Beats iOS in the US | Techrights

Leave a Comment

Your email address will not be published. Required fields are marked *