Reply to post:

Stealing secret crypto-keys from PCs using leaked radio emissions

Michael Wojcik Silver badge

Most of us who have been in the industry for any length of time knew this twenty years ago.

Sigh.

There's been extensive research in, and improvements of, side-channel attacks over the past two decades (and longer1). Claiming that it's not newsworthy just demonstrates your ignorance of the field.

Many - though by no means all - side-channel attacks require proximity. Few require physical access, which is not at all the same thing.

I know. You're in the running for the coveted title of Most Brilliant Reg Reader and can't miss any opportunity to demonstrate you know more than everyone else.

1Try at least thirty years, not twenty. Van Eck's first public disclosure of EMF snooping on CRTs was published in '85. TEMPEST started in the late '50s; it was classified for a long time, but the Feds launched the Industry TEMPEST Program in '74. Of course, some classes of side-channel attacks only really became prominent with Kocher's presentation at CRYPTO '96.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon