"Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

Researchers from the Ben-Gurion University of the Negev and Cornell University have discovered that it is possible to recover secret keys from a device by analyzing video footage of its power LED in a clever side-channel attack. They found that cryptographic computations conducted by the CPU alter the device's power consumption, thereby affecting the brightness of the power LED. Threat actors can extract the cryptographic keys from a smart card reader by leveraging video camera devices such as an iPhone 13 or an Internet-connected surveillance camera. Specifically, video-based cryptanalysis is performed by getting video footage of rapid changes in an LED's brightness and using the rolling shutter effect of the video camera to capture the physical emanations. This article continues to discuss the side-channel attack that makes it possible to recover secret keys from a device by analyzing video footage of its power LED.

THN reports "Researchers Find Way to Recover Cryptographic Keys by Analyzing LED Flickers"

Submitted by Anonymous on