Related Concepts
Definition
Computer and communications devices emit numerous forms of energy. Many of these emissions are produced as unintended side effects of normal operation. For example, where these emissions take the form of radio waves, they can often be observed interfering with nearby radio receivers. Some of the unintentionally emitted energy carries information about processed data. Under good conditions, a sophisticated and well-equipped eavesdropper can intercept and analyze such compromising emanations to steal information. Even where emissions are intended, as is the case with transmitters and displays, only a small fraction of the overall energy and information content emitted will ever reach the intended recipient. Eavesdroppers can use specialized and more sensitive receiving equipment to tap into the rest and access confidential information, often in unexpected ways, as some of the following examples illustrate.
Background
Much knowledge in this area is...
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Recommended Reading
van Eck W (1985) Electromagnetic radiation from video display units: an eavesdropping risk? Comput Secur 4:269–286
Markus KG (2003) Compromising emanations: eavesdropping risks of computer displays. Technical Report UCAM-CL-TR-577, University of Cambridge, Computer Laboratory
Markus KG (2002) Optical time-domain eavesdropping risks of CRT displays. In: Proceedings of 2002 IEEE symposium on security and privacy, Oakland, CA, 12–15 May 2002. IEEE Computer Society Press, Los Alamitos, pp 3–18, ISBN 0-7695-1543-6
Peter S (1990) The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Comput Secur 9:53–58
Joe L, Umphress DA (2002) Information leakage from optical emanations. ACM Trans Inform Syst Secur 5(3):262–289
Dmitri A, Agrawal R (2004) Keyboard acoustic emanations. In: Proceedings of 2004 IEEE symposium on security and privacy, Oakland, CA, 9–12 May 2004. IEEE Computer Society Press, Los Alamitos, CA
Proceedings of symposium on electromagnetic security for information protection (SEPI’91), Rome, Italy, 21–22 November 1991, Fondazione Ugo Bordoni
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Kuhn, M. (2011). Compromising Emanations. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_188
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_188
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering