Compromising electromagnetic radiation - challenges, threats and protection

  • Milorad S. Markagić Univerzitet odbrane, Vojna akademija
Keywords: radiation, eavesdropping, security of information,

Abstract


The aim of this paper is to open up problems regarding parasitic radiation, both inductive and conductive one, originating from devices for data transmission, processing, generation and data protection as well as from their  assemblies. All devices that are used today, both in everyday use at home and in communication between individuals or institutions, contain, other than useful electromagnetic radiation, a part of useless, but also inevitable signals that are outside the control of manufacturers. Devices used for encrypting information are particularly vulnerable to this phenomenon, because every form of protection is meaningless if any part of useful information is accessible, and one of the most important segments of reaching them is monitoring parasitic radiation.

 

Author Biography

Milorad S. Markagić, Univerzitet odbrane, Vojna akademija

Nastavnik u Katedri telekomunikacija i informatike.

Stalni sudski veštak za oblast informacione tehnologije.

Specijalista upravljanja kvalitetom kriptografskih sistema.

Ovlašćeni sertifikator po standardu ISO 9001:2005

References

Atkinson, J.M., 2010. Tempest 101. Granite Island Group. [Internet]. Available at: http://www.tscm.com/TSCM101tempest.html. Accessed: 01 July 2015.

Blandova, E.S., 2001. Pomehopodavljajushhie izdelija. Rekomendacii po vyboru i primeneniju. Special"aja tehnika (in Russian).

Horev, A.A., 1998. Sposoby i stedstva zashhity informacii, uchebnoe posobie, Moskva: MoD of Russian Federation (in Russian).

Kuhn, M.G. & Anderson R.J., 1998. Soft Tempest: Hidden Data Transmission Using Electromagnetic Emanations. In: Aucsmith D. (eds) Information Hiding. IH 1998. Lecture Notes in Computer Science, 1525. Springer, Berlin, Heidelberg. Available at: https://doi.org/10.1007/3-540-49380-8_10.

Markagić, M.S., 2010. KEMZ i informaciona bezbednost. Zbornik radova, ZT10. Belgrade: Military Academy (in Serbian).

-National Security Agency, 2007. TEMPEST: A Signal Problem. [Internet]. Available at: https://www.nsa.gov/news-features/declassified-documents/cryptologic-spectrum/assets/files/tempest.pdf. Accessed: 01 July 2015.

TEMPEST workshop presentation, RIGA, 2008. [Internet]. Available at: http://1010.co.uk/org/tempest_presn.html. Accessed: 01 July 2015.

Ward, G., 1993. TEMPEST in a Teapot. A note discussing the prevention of electromagnetic eavesdropping of personal computers. [Internet]. Available at: http://www.austinlinks.com/Crypto/tempest.html. Accessed: 01 July 2015.

Published
2017/12/21
Section
Professional Papers