Abstract
Information leakage via electromagnetic emanation, usually known as Tempest, has been recognized as a threat and countermeasures have been proposed. In particular, Kuhn and Anderson developed a protective measure for Tempest called the Tempest fonts. Through experiments, we have investigated and evaluated the effectiveness of the Tempest fonts. Furthermore, we propose a new measure based on a similar approach to prevent successful Tempest attacks. While Kuhn and Anderson use Fourier transformation as a low-pass filter, our approach uses a Gaussian filter in addition to Fourier transformation. Our experimental results show that this approach is more effective.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Agrawal, D., Archambeault, B., Chari, S., Rao, J.R.: Advances in Side-Channel Cryptanalysis Electromagnetic Analysis and Template Attacks. RSA Laboratories Cryptobytes 6(1), 20–32 (Spring 2003)
Agrawal, D., Archambeault, B., Rao, J.R., Rohatgi, P.: The EM side channel(s). In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 29–45. Springer, Heidelberg (2003)
Chari, S., Rao, J.R., Rohatgi, P.: Tempest attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13–28. Springer, Heidelberg (2003)
Gandolfi, K., Mourtel, C., Oliver, F.: Electromagnetic analysis: Concrete results. In: Koç, Ç.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 251–261. Springer, Heidelberg (2001)
Gonzalez, R., Woods, R.: Digital Image Processing. Addison-Wesley Publishing Company, Reading (1992)
Kuhn, M.: Electromagnetic Eavesdropping Risks of Flat-Panel Displays. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 88–107. Springer, Heidelberg (2005), Presentation file is available at http://www.petworkshop.org/2004/program.html
Kuhn, M.: Filtered-Tempest font, available at http://www.c1.cam.ac.uk/~mgk25/st-font.zip
Kuhn, M.G., Anderson, R.J.: Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 124–142. Springer, Heidelberg (1998)
Loughry, J., Umphress, D.A.: Information leakage from optical emanations. ACM Transactions on Information and System Security 5(3), 262–289 (2002)
Quisquater, J.-J., Samyde, D.: Electromagnetic analysis (EMA): measures and countermeasures for smart cards. In: Attali, S., Jensen, T. (eds.) E-smart 2001. LNCS, vol. 2140, pp. 200–210. Springer, Heidelberg (2001)
Smulders, P.: The threat of information theft by reception of electromagnetic radiation from RS-232 cables. Computer and Security 9 (1990)
Video Electronics Standards Association, http://www.vesa.org/
van Eck, W.: Electromagnetic radiation from video display units: An eavesdropping risk? Computers and Security 4 (1985)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Tanaka, H., Takizawa, O., Yamamura, A. (2005). Evaluation and Improvement of the Tempest Fonts. In: Lim, C.H., Yung, M. (eds) Information Security Applications. WISA 2004. Lecture Notes in Computer Science, vol 3325. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-31815-6_36
Download citation
DOI: https://doi.org/10.1007/978-3-540-31815-6_36
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24015-0
Online ISBN: 978-3-540-31815-6
eBook Packages: Computer ScienceComputer Science (R0)