Skip to main content

Evaluation and Improvement of the Tempest Fonts

  • Conference paper
Information Security Applications (WISA 2004)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3325))

Included in the following conference series:

Abstract

Information leakage via electromagnetic emanation, usually known as Tempest, has been recognized as a threat and countermeasures have been proposed. In particular, Kuhn and Anderson developed a protective measure for Tempest called the Tempest fonts. Through experiments, we have investigated and evaluated the effectiveness of the Tempest fonts. Furthermore, we propose a new measure based on a similar approach to prevent successful Tempest attacks. While Kuhn and Anderson use Fourier transformation as a low-pass filter, our approach uses a Gaussian filter in addition to Fourier transformation. Our experimental results show that this approach is more effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Agrawal, D., Archambeault, B., Chari, S., Rao, J.R.: Advances in Side-Channel Cryptanalysis Electromagnetic Analysis and Template Attacks. RSA Laboratories Cryptobytes 6(1), 20–32 (Spring 2003)

    Google Scholar 

  2. Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Chari, S., Rao, J.R., Rohatgi, P.: Tempest attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  4. Gandolfi, K., Mourtel, C., Oliver, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  5. Gonzalez, R., Woods, R.: Digital Image Processing. Addison-Wesley Publishing Company, Reading (1992)

    Google Scholar 

  6. Kuhn, M.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005), Presentation file is available at http://www.petworkshop.org/2004/program.html

    Chapter  Google Scholar 

  7. Kuhn, M.: Filtered-Tempest font, available at http://www.c1.cam.ac.uk/~mgk25/st-font.zip

  8. Kuhn, M.G., Anderson, R.J.: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 124–142. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  9. Loughry, J., Umphress, D.A.: Information leakage from optical emanations. ACM Transactions on Information and System Security 5(3), 262–289 (2002)

    Article  Google Scholar 

  10. Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  11. Smulders, P.: The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Computer and Security 9 (1990)

    Google Scholar 

  12. Video Electronics Standards Association, http://www.vesa.org/

  13. van Eck, W.: Electromagnetic radiation from video display units: An eavesdropping risk? Computers and Security 4 (1985)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tanaka, H., Takizawa, O., Yamamura, A. (2005). Evaluation and Improvement of the Tempest Fonts. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-31815-6_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24015-0

  • Online ISBN: 978-3-540-31815-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics