the inverse faraday challenge myth faraday cage grounded
play

The inverse Faraday challenge Myth: Faraday cage (grounded or - PowerPoint PPT Presentation

1 2 The inverse Faraday challenge Myth: Faraday cage (grounded or ungrounded) Daniel J. Bernstein eliminates some types of leakage. University of Illinois at Chicago & Technische Universiteit Eindhoven 1 2 The inverse Faraday


  1. 1 2 The inverse Faraday challenge Myth: Faraday cage (grounded or ungrounded) Daniel J. Bernstein eliminates some types of leakage. University of Illinois at Chicago & Technische Universiteit Eindhoven

  2. 1 2 The inverse Faraday challenge Myth: Faraday cage (grounded or ungrounded) Daniel J. Bernstein eliminates some types of leakage. University of Illinois at Chicago & Fact for each m : Technische Universiteit Eindhoven All information inside Faraday cage is visible m meters away.

  3. 1 2 The inverse Faraday challenge Myth: Faraday cage (grounded or ungrounded) Daniel J. Bernstein eliminates some types of leakage. University of Illinois at Chicago & Fact for each m : Technische Universiteit Eindhoven All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism.

  4. 1 2 The inverse Faraday challenge Myth: Faraday cage (grounded or ungrounded) Daniel J. Bernstein eliminates some types of leakage. University of Illinois at Chicago & Fact for each m : Technische Universiteit Eindhoven All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  5. 1 2 inverse Faraday challenge Myth: Faraday cage Typical EM (grounded or ungrounded) Use sens J. Bernstein eliminates some types of leakage. from chip. University of Illinois at Chicago & Fact for each m : echnische Universiteit Eindhoven All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  6. 1 2 raday challenge Myth: Faraday cage Typical EM attack: (grounded or ungrounded) Use sensors to extract Bernstein eliminates some types of leakage. from chip. Compute Illinois at Chicago & Fact for each m : Universiteit Eindhoven All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  7. 1 2 nge Myth: Faraday cage Typical EM attack: (grounded or ungrounded) Use sensors to extract EM data eliminates some types of leakage. from chip. Compute secret k Chicago & Fact for each m : Eindhoven All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  8. 2 3 Myth: Faraday cage Typical EM attack: (grounded or ungrounded) Use sensors to extract EM data eliminates some types of leakage. from chip. Compute secret key. Fact for each m : All information inside Faraday cage is visible m meters away. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  9. 2 3 Myth: Faraday cage Typical EM attack: (grounded or ungrounded) Use sensors to extract EM data eliminates some types of leakage. from chip. Compute secret key. Fact for each m : Countermeasure: All information inside Faraday Put Faraday cage around chip. cage is visible m meters away. Sensors fail. Hard proof: Messy calculations using laws of electromagnetism. Easy proof: This is a special case of the “holographic principle”.

  10. 2 3 Myth: Faraday cage Typical EM attack: (grounded or ungrounded) Use sensors to extract EM data eliminates some types of leakage. from chip. Compute secret key. Fact for each m : Countermeasure: All information inside Faraday Put Faraday cage around chip. cage is visible m meters away. Sensors fail. Hard proof: Messy calculations Challenge: using laws of electromagnetism. Surround Faraday cage with an inverse Faraday cage that Easy proof: This is a special case rebuilds the original EM data. of the “holographic principle”. Sensors work again.

  11. 2 3 Faraday cage Typical EM attack: Should b (grounded or ungrounded) Use sensors to extract EM data inverse F eliminates some types of leakage. from chip. Compute secret key. • many EM • the mess for each m : Countermeasure: • many EM information inside Faraday Put Faraday cage around chip. is visible m meters away. Sensors fail. roof: Messy calculations Challenge: laws of electromagnetism. Surround Faraday cage with an inverse Faraday cage that roof: This is a special case rebuilds the original EM data. “holographic principle”. Sensors work again.

  12. 2 3 cage Typical EM attack: Should be able to ungrounded) Use sensors to extract EM data inverse Faraday cage types of leakage. from chip. Compute secret key. • many EM sensors; • the messy calculations; : Countermeasure: • many EM generato inside Faraday Put Faraday cage around chip. meters away. Sensors fail. Messy calculations Challenge: electromagnetism. Surround Faraday cage with an inverse Faraday cage that This is a special case rebuilds the original EM data. hic principle”. Sensors work again.

  13. 2 3 Typical EM attack: Should be able to build Use sensors to extract EM data inverse Faraday cage from leakage. from chip. Compute secret key. • many EM sensors; • the messy calculations; Countermeasure: • many EM generators. raday Put Faraday cage around chip. ay. Sensors fail. calculations Challenge: electromagnetism. Surround Faraday cage with an inverse Faraday cage that ecial case rebuilds the original EM data. rinciple”. Sensors work again.

  14. 3 4 Typical EM attack: Should be able to build Use sensors to extract EM data inverse Faraday cage from from chip. Compute secret key. • many EM sensors; • the messy calculations; Countermeasure: • many EM generators. Put Faraday cage around chip. Sensors fail. Challenge: Surround Faraday cage with an inverse Faraday cage that rebuilds the original EM data. Sensors work again.

  15. 3 4 Typical EM attack: Should be able to build Use sensors to extract EM data inverse Faraday cage from from chip. Compute secret key. • many EM sensors; • the messy calculations; Countermeasure: • many EM generators. Put Faraday cage around chip. Sensors fail. Probably easier: Directly build a many-sensor EM attack against Challenge: a chip inside a Faraday cage. Surround Faraday cage with an inverse Faraday cage that rebuilds the original EM data. Sensors work again.

  16. 3 4 Typical EM attack: Should be able to build Use sensors to extract EM data inverse Faraday cage from from chip. Compute secret key. • many EM sensors; • the messy calculations; Countermeasure: • many EM generators. Put Faraday cage around chip. Sensors fail. Probably easier: Directly build a many-sensor EM attack against Challenge: a chip inside a Faraday cage. Surround Faraday cage with an inverse Faraday cage that Maybe harder, maybe impossible: rebuilds the original EM data. Build inverse Faraday cage as a Sensors work again. simple physical device.

  17. 3 4 ypical EM attack: Should be able to build Technical note the talk: My nsors to extract EM data inverse Faraday cage from primary Fa chip. Compute secret key. • many EM sensors; inside the into movements • the messy calculations; Countermeasure: cage, creating • many EM generators. the cage, which raday cage around chip. cage should rs fail. Probably easier: Directly build Faraday cages a many-sensor EM attack against tap the ground. Challenge: can also b a chip inside a Faraday cage. Surround Faraday cage with of information, sensors might inverse Faraday cage that Maybe harder, maybe impossible: rebuilds the original EM data. Build inverse Faraday cage as a rs work again. simple physical device.

  18. 3 4 attack: Should be able to build Technical note added to the talk: My understanding extract EM data inverse Faraday cage from primary Faraday effect Compute secret key. • many EM sensors; inside the Faraday cage into movements of electrons • the messy calculations; Countermeasure: cage, creating magnetic • many EM generators. the cage, which EM senso cage around chip. cage should be able to Probably easier: Directly build Faraday cages it should a many-sensor EM attack against tap the ground. Electromagnetic can also be converted a chip inside a Faraday cage. y cage with of information, so using sensors might also be raday cage that Maybe harder, maybe impossible: riginal EM data. Build inverse Faraday cage as a again. simple physical device.

  19. 3 4 Should be able to build Technical note added to slides after the talk: My understanding of the data inverse Faraday cage from primary Faraday effect is that waves secret key. • many EM sensors; inside the Faraday cage are converted into movements of electrons on the • the messy calculations; cage, creating magnetic fields outside • many EM generators. the cage, which EM sensors outside chip. cage should be able to see. For grounded Probably easier: Directly build Faraday cages it should also be helpful a many-sensor EM attack against tap the ground. Electromagnetic w can also be converted into other fo a chip inside a Faraday cage. with of information, so using other types sensors might also be helpful. that Maybe harder, maybe impossible: data. Build inverse Faraday cage as a simple physical device.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend