Definition
All attacks on the functioning of an electric circuit by means of electromagnetic field.
Background
Summary: Conquest without fight is the basic idea of Sun Tzu in The art of warwritten 2,500 years ago. Force an enemy to retreat immediately, strike with high precision without leaving of the origin of the blow, shut down an adversary’s communications networks, disrupt its power supplies, yet still leaving buildings intact are the properties conferred to an attack that uses electromagnetic waves at the right frequencies. Most types of matter are transparent to microwaves, and waves coming from an electromagnetic blast are difficult to stop in an appropriate manner. A mastered generation of microwaves may not only disrupt or damage electronic equipment, but may also create faults and even completely destroy it. Solar storms constitute a good illustration of the kind of disruption that an electronic equipment might be submitted to when exposed to electromagnetic disruptions...
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Agrawal D, Archambeault B, Rao JR, Rohatgi P (2002) The EM side-channel(s). In: Kaliski BS Jr, Koç CK, Paar C (eds) Proceeding of the cryptographic hardware and embedded systems CHES 2002, Redwood City. Lecture notes in computer science, vol 2523. Springer, Berlin, pp 29–45. Also available at http://ece.gmu.edu/crypto/ches02/talks.htm
Anderson R, Kuhn M (1996) Tamper resistance—a cautionary note. In: Proceedings of the second Usenix workshop on electronic commerce, pp 1–11. Also available at http://www.cl.cam.ac.uk/∼mgk25/tamper.pdf
Biham E, Shamir A (1997) Differential fault analysis of secret key cryptosystems. In: Kaliski B (ed) Advances in cryptology – CRYPTO’97, Santa Barbara. Lecture notes in computer science, vol 1294. Springer, pp 513–525. Also available at http://citeseer.nj.nec.com/biham97differential.html
Boneh D, Demillo RA, Lipton RJ (1997) On the importance of checking cryptographic protocols for faults. In: Fumy W (ed) Advances in cryptology – EUROCRYPT’97, Santa Barbara. Lecture notes in computer science, vol 1233. Springer, pp 37–51. Also available at http://citeseer.nj.nec.com/boneh97importance.html
Bresselin S (2003) Une avancée franco-allemande vers la bombe “E”. Air & Cosmos, No. 1877, 14 February 2003
Gandolfi K, Mourtel C, Olivier F (2001) Electromagnetic attacks: concrete results. In: Koç ÇK, Naccache D, Paar C (eds) Proceedings of the cryptographic hardware and embedded systems CHES 2001, Paris. Lecture notes in computer science, vol 2162. Springer, pp 251–261. Also available at http://www.gemplus.com/smart/r\{∖{ _}\}d/publications/pdf/GMO01ema.pdf
Abrams M (2003) Dawn of the E-Bomb. IEEE Spectrum 2003. Also available at http://www.spectrum.ieee.org/WEBONLY/publicfeature/nov03/1103ebom.html
Jenkins CR, Durgin DL (1975) EMP susceptibility of integrated circuits. IEEE Trans Nucl Sci NS-22(6)
Kopp C (1997) Hardening your computing assets. Asia/Pacific Open Systems Review. Computer Magazine Group, NSW under the title of “Information Warfare—Part 2,” Australia. Also available at http://www.globalsecurity.org/military/library/report/1997/harden.pdf
Kopp C (1996) The electromagnetic bomb—a weapon of electrical mass destruction. USAF CADRE Air Chronicles, Melbourne. Also available at http://www.airpower.maxwell.af.mil/airchronicles/kopp/apjemp.html
Kuhn MG, Anderson RJ (1998) Soft tempest: Hidden data transmission using electromagnetic emanations. In: Proceedings of information hiding, second international workshop, IH’98, Portland, pp 124–142. Also available at http://www.cl.cam.ac.uk/∼mgk25/ih98-tempest.pdf
Lee KSH, Liu TK, Morins L (1978) EMP Response of aircraft antennas. IEEE Trans Antenna Prop IEEE AP-26, 1
Petit J-P (2003) Armes secrètes américaines – L’extraordinaire témoignage d’un scientifique. Collection Aux marches de la science, Albin Michel, ISBN: 2226136169
Quisquater J-J, Samyde D (2001) Electro-Magnetic Analysis (EMA): Measures and countermeasures for smart cards. In: Attali I, Jensen T (eds) Proceedings of the international conference on research in smart cards E-Smart, Cannes. Lecture notes in computer science, vol 2140. Springer, pp 200–210
Skorobogatov S, Anderson R (2002) Optical fault induction attacks. In: Kaliski BS Jr, Koç CK, Paar C (eds) Proceedings of the cryptographic hardware and embedded systems CHES 2002, Redwood City. Lecture notes in computer science, vol 2523. Springer, pp 2–12. Also available at http://ece.gmu.edu/crypto/ches02/talks.htm
Tasca DM, Wunsch DC, Domingos H (1975) Device degradation by high amplitude currents and response characteristics of discrete resistors. IEEE Trans Nucl Sci NS-22 (6)
Wunsch DC, Bell RR (1968) Determination of threshold failure levels of semiconductor diodes and transistors due to pulse voltages. IEEE Trans Nucl Sci NS-15(6)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Quisquater, JJ., Samyde, D. (2011). Radio Frequency Attacks. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_133
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_133
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering