Decrypting with radiation

The attack sends a few carefully-crafted ciphertexts, and when these are decrypted by the target computer, they trigger the occurrence of specially-structured values inside the decryption software. These special values cause observable fluctuations in the electromagnetic field surrounding the laptop, in a way that depends on the pattern of key bits. The secret key can be deduced from these fluctuations, through signal processing and cryptanalysis.

!!!

Leave a comment