Anonymous
10/08/2019 (Tue) 13:14:02
No.12125
del
The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.
https://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdf