Side-Channel Attack and TEMPEST Certification Program (TCP)

The Visual Microphone: Passive Recovery of Sound from Video

Side-Channel Attack

In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in a cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation. (Cryptanalysis also includes searching for side-channel attacks.) Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks.

Source: Wikipedia

TEMPEST Certification Program

TEMPEST is a U.S. National Security Agency specification and a NATO certification referring to spying on information systems through leaking emanations, including unintentional radio or electrical signals, sounds, and vibrations. TEMPEST covers both methods to spy upon others and how to shield equipment against such spying. The protection efforts are also known as emission security (EMSEC), which is a subset of communications security (COMSEC).

Source: Wikipedia

The TEMPEST Certification Program (TCP) consists of three closely related NSA programs: the Certified TEMPEST Products Program, the Certified TEMPEST Test Services Program, and the Zoned Equipment Program. Each of these programs involves partnerships with industrial companies.

Source: NSA

References

Signal, Data, and Modulation

Modulation Schemes (Credit: Dr. Jan Noordhof)
Modulation Schemes

Signal, as a waveform, is the carrier of data. By alternating amplitude, frequency, phase, or any combination of them, the modulation process synthesizes the signal (as the carrier wave) and the data (as an input wave) and generates the modulated result. Modulation can be analog or digital.

Digital Modulation

Data Element vs Signal Element
Data Element vs Signal Element (Credit: rfwireless-world.com)

There are many types of digital modulation techniques, for example:

  • ASK – Amplitude Shift Keying
  • FSK – Frequency Shift Keying
  • PSK – Phase Shift Keying

Tutorialspoint.com has more.

References