{"id":263,"date":"2014-01-02T13:33:27","date_gmt":"2014-01-02T20:33:27","guid":{"rendered":"http:\/\/somethingk.com\/main\/?p=263"},"modified":"2014-01-02T13:33:53","modified_gmt":"2014-01-02T20:33:53","slug":"decrypting-files-by-sound-part-1","status":"publish","type":"post","link":"https:\/\/somethingk.com\/main\/decrypting-files-by-sound-part-1\/","title":{"rendered":"Decrypting Files by Sound? Part 1"},"content":{"rendered":"<p style=\"text-align: left;\">I found this <a title=\"RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis\" href=\"http:\/\/www.tau.ac.il\/~tromer\/papers\/acoustic-20131218.pdf\" target=\"_blank\">paper<\/a> recently that discuss how an RSA encryption key can be enumerated by sound. It was written by Adi Shamir, the co-inventor of the RSA algorithm (the \u2018S\u2019 in RSA), so the paper seems to be a little more legit than just someone\u2019s paranoia. Basically, the idea is based off of the noises a computer makes when utilizing different levels of power. These noises consist of high-pitched tones that can be detected by the right equipment. Each task performed by a computer requires varying amounts of resources and power therefore a new unique set of tones for a process. So it seems possible that the noises resulting from a machine decrypting a key could be picked up and used to for enumeration.<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.techfreakstuff.com\/wp-content\/uploads\/2010\/02\/password-decrypting-600x394.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" alt=\"\" src=\"http:\/\/www.techfreakstuff.com\/wp-content\/uploads\/2010\/02\/password-decrypting-600x394.jpg\" width=\"360\" height=\"236\" \/><\/a><\/p>\n<p>This is definitely something I would love to test out! However, as of now I don\u2019t have the right equipment but I don\u2019t want to give up on the project yet. Instead, I\u2019ll make baby steps. Encrypt something with RSA.<\/p>\n<p><strong>To be continued\u2026<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I found this paper recently that discuss how an RSA encryption key can be enumerated by sound. It was written by Adi Shamir, the co-inventor of the RSA algorithm (the \u2018S\u2019 in RSA), so the paper seems to be a little more legit than just someone\u2019s paranoia. Basically, the idea is based off of the noises a computer makes when [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,43,34,24],"tags":[84,83,334,82,85],"class_list":["post-263","post","type-post","status-publish","format-standard","hentry","category-enumeration","category-exploit","category-forensics","category-penetration-testing","tag-adi-shamir","tag-decyption","tag-enumeration","tag-rsa","tag-sound"],"_links":{"self":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":4,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/263\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/posts\/263\/revisions\/267"}],"wp:attachment":[{"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/media?parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/categories?post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/somethingk.com\/main\/wp-json\/wp\/v2\/tags?post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}