Re: NONSTOP Crypto Query

2001-01-15 Thread John Young

I believe the main reason Peter Wright wanted unconventional 
snooping devices was to avoid detection by sweepers who 
regularly checked for the usual, known devices.

Intercepting signals from radiated objects was one of those
methods for it avoided having to plant a device within the 
targeted space. However, such methods eventually became
known to sweepers and countermeasures were taken
though Wright does not describe them.

Wright wrote of one instance when Soviet sweepers of
their Egyptian ally's code room discovered a British mike
concealed in a phone set. The Brits could hear the
sweepers unscrewing the cover, pausing, then screwing 
the cover back on without removing the disc mike. Wright
presumes the Soviets wanted the Brits to hear about 
the strong opposition the Soviets were planning to
British Middle East ventures.

Which raises the question of what devices/methods
Wright and others used to supplement the ones that
have been written about. Seldom was only one
method applied.

On Steve Bellovin's point to "look for the plaintext,"
when examing encrypted signal: The NONSTOP
document lists that threat as a required testing procedure
of encrypted signals, as well as for emissions from
nearby cabling and equipment that may not themselves
be processing encrypted or RED signals.

RED/BLACK requirements for separating classified
intelligence bearing data from those carrying unclassified
data repeatedly emphasize the threat of seemingly
innocuous, unintentional antennas snarfing both
plain text and cipher text. Those requirements are
described in "NSTISSAM TEMPEST/2-95 RED/BLACK 
Installation Guide":

  http://cryptome.org/tempest-2-95.htm

It is this doc which states that NONSTOP is the principle 
TEMPEST vulnerability of "transportables, aircraft and ships."

It may be that the many surfaces of these objects is what
makes such good emitters of unintentional signals, especially
when radiated. The changing environment of each probably 
also complicates countermeasures.

What I've not seen are reports on the emissions of individual
warfighters who may be heavily clothed with electronic and
antenna-like devices. Unless the term "transportables" covers
such mobile, multi-faceted objects.

Then, there are the plain voice signals emitted by a vehicle in 
which an encrypted cellphone user is riding. Say, Potus or 
Russian bear. And so on.

The full electromagnetic spectrum is presumably capable of
transmitting more covertly than overtly -- that is, there are far
more signals being sent than there are devices to receive
and process them. So we are disinformed.






RE: NONSTOP Crypto Query

2001-01-15 Thread Trei, Peter

I've seen an existance proof which indicates that this is possible.
Back when I was first getting involved with computers (circa 1972),
some digitizer tablets worked by speed-of-sound measurements.
The stylus tip contained a small  spark gap which was energized 
when the stylus pressed on the  tablet. This created a spark, 
and the spark a minuscule roll of  thunder. Microphones situated 
along the edges of the tablet recorded the arrival times of the sound, 
and the location of the stylus calculated within a millimeter or two.

This was a peripheral for a DEC PDP-8E.

This was calculating a position over about 20 cm to a millimeter,
in real time, in 1972. Doing so to a resolution of a centimeter or
two, in 2001, ever several meters sounds feasible.

Peter Trei  

> --
> From: Ray Dillinger[SMTP:[EMAIL PROTECTED]]
> Sent: Friday, January 12, 2001 4:37 PM
> To:   John Young
> Cc:   [EMAIL PROTECTED]
> Subject:  Re: NONSTOP Crypto Query
> 
> 
> 
> On Fri, 12 Jan 2001, John Young wrote:
> 
> >Wright also describes the use of supersensitive microphones
> >to pick up the daily setting of rotors on cryptomachines of the 
> >time, in particular the Hagelins made by CryptoAG.
> 
> Hmmm.  That sounds like a trick that could be brought up to 
> date.  If you get two sensitive microphones in a room, you 
> should be able to do interferometry to get the exact locations 
> on a keyboard of keystrokes from the sound of someone typing.  
> I guess three would be better, but with some reasonable 
> assumptions about keys being coplanar or on a surface of known 
> curvature, two would do it.  Interesting possibilities.
> 
>   Bear
> 
> [A quick contemplation of the wavelength of the sounds in question
> would put an end to that speculation I suspect. --Perry]
> 




Re: NONSTOP Crypto Query

2001-01-14 Thread Andrew Cooke

> [A quick contemplation of the wavelength of the sounds in question
> would put an end to that speculation I suspect. --Perry]

I know this has been somewhat done to death, but there's a nice
comparison:  GPS positioning using carrier phase tracking is equivalent
(well, it's reversed - clicks come from the microphones/satellites and
the key/receiver calculates its position - but the principle is the
same).  This can give millimetre accuracy with carrier wavelengths of
19cm (if you're very careful, have lots of time and maybe some luck).  
The precision comes from cross-correlating wave trains rather
than trying to measure a particular point (eg the initial rise of the
click) accurately.  You wouldn't do as well with keyboard clicks, but
then you don't need to.

Note that usually GPS positioning is not done using carrier phase
tracking - that, together with problems like different atmospheric paths
from differnet satellites and, in the past, noise added to civillian
signals, gives much lower precision.  See, for example,
http://www.colorado.edu/geography/gcraft/notes/gps/gps.html

Accuracy for keyboards would depend on how many wavelengths can be
detected at good signal-to-noise within a single "click" (and having
stable recordings with no wow or flutter).  Also, it would be useful to
know the identity of one key - return for example - to help solve for
the position of the keyboard relative to the microphones.  Getting an
initial solution might be difficult - it would be a big help to know the
relative position of keyboard and mcirophones to within a wavelength or
two (and have all recordings marked by synchronized clock ticks).  If
the user moved their keyboard during typing it would cause havoc with
any attempt to converge on a solution.  Maybe we should all start
walking around as we type...

Andrew

(In a previous job I wrote software to calculate positions from GPS
satellites - Paul Crowley may be able to correct me if I have made any
errors as he was there too...)





Re: NONSTOP Crypto Query

2001-01-14 Thread Arnold G. Reinhold

One interesting question is exactly how strong radio frequency 
illumination could cause compromise of information being processed by 
electronic equipment. I have an idea for a mechanism whereby such 
illumination could induce generation of harmonic and beat frequencies 
that are modulated by internal data signals.

This mechanism is based  on an effect that is familiar to ham radio 
operators, who are often bedeviled by neighbors complaining of 
television interference. Here is a quote from the chapter on 
interference in an old (1974) edition of the ARRL Radio Amateur's 
Handbook:

"Harmonics by  Rectification"

"Even though the transmitter is completely free from harmonic output 
it is still possible for interference to occur because of harmonics 
generated outside the transmitter. These result from rectification of 
fundamental-frequency currents induced in conductors in the vicinity 
of the transmitting antenna. Rectification can take place at any 
point where two conductors are in  poor electrical contact, a 
condition that frequently exists in plumbing, downspouting, BX cables 
crossing each other, ...It can also occur ... in power supplies, 
speech equipment, etc. that may not be enclosed in the shielding 
about the RF circuits."

In the case of computer equipment, the conductor could be a wire, 
external cable or even a trace on a printed circuit board. Now 
imagine that the source of rectification is not a poor connection, 
but a transistor junction in a logic gate or line driver. As that 
device is switched on and off, RF rectification may be switched on 
and off as well, modulating the generated harmonic with the input 
signal. If that signal carries sensitive information, all the 
information would be broadcast on the harmonic output. Keyboard 
interfaces, video output circuits and serial line drivers come to 
mind as excellent candidates for this effect, since they often carry 
sensitive information and are usually connected to long wires that 
can absorb the incident RF energy and radiate the harmonics.

All an attacker has to do is monitor a site transmitting at frequency 
f and analyze any signals at 2*f, 3*f, etc. If the site has more than 
one transmitter, say a command hut, or a naval ship,  there are also 
beat frequencies to consider f1+f2, f1-f2, 2*f1+f2, 2*f1-f2,  etc. 
Note that harmonics and beats radiated from the equipment under 
attack are vastly easier to detect that any re-radiation at the 
fundamental frequency, which would be swamped by the primary 
transmitter's signal.

There is also a potential active attack where an adversary 
frequency-sweeps your equipment with RF hoping to find a parasitic 
harmonic generator. This might be the "resonance" technology Peter 
Wright referred to.  If the source illumination causes a resonance 
by, say, operating at 1/4 the electrical wavelength of the video 
output cable, any effect might be magnified greatly. (The even 
harmonics would be suppressed, but odd harmonics would not be.) 
Illumination could be done directly or over telephone, cable TV or 
power lines.

This might also explain "NONSTOP testing and protection being 
especially needed on vehicles, planes and ships." since they often 
carry multiple radio transmitters and are more easily exposed to 
monitoring and external illumination than a fixed site inside a 
secure perimeter.

The two code names (NONSTOP and HIJACK) might possibly refer to the 
passive and active modes.  Or NONSTOP may refer to radiated signals 
and HIJACK to signals over hardwire lines. Or one could cover all the 
effects I am proposing and the other something completely different. 
Whatever.

FWIW,

Arnold Reinhold


At 2:23 AM + 1/13/2001, David Wagner wrote:
>In a paper on side channel cryptanalysis by John Kelsey, Bruce Schneier,
>Chris Hall, and I, we speculated on possible meanings of NONSTOP and HIJACK:
>
>   [...]
>   It is our belief that most operational cryptanalysis makes use of
>   side-channel information.  [...]  And Peter Wright discussed data
>   leaking onto a transmission line as a side channel used to break a
>   French cryptographic device [Wri87].
>
>   The (unclassified) military literature provides many examples of
>   real-world side channels.  [...]  Peter Wright's crosstalk anecdote
>   is probably what the HIJACK codeword refers to [USAF98]. Along
>   similar lines, [USAF98] alludes to the possibility that crosstalk from
>   sensitive hardware near a tape player might modulate the signal on the
>   tape; [USAF98] recommends that tapes played in a classified facility be
>   degaussed before they are removed, presumably to prevent side channels
>   from leaking. Finally, one last example from the military literature
>   is the NONSTOP attack [USAF98, Chapters 3-4]: after a careful reading
>   of unclassified sources, we believe this refers to the side channel
>   that results when cryptographic hardware is illuminated by a nearby
>   radio transmitter (e.g. a cellphone)

Re: NONSTOP Crypto Query

2001-01-14 Thread Dave Emery

On Sat, Jan 13, 2001 at 12:11:13PM -0800, Ray Dillinger wrote:
> 

> 
> We hear low-frequency sounds when we type.  But have we ever checked 
> for high-frequency sounds outside of human hearing range?  I'd bet 
> a keyboard has a number of squeaks and ticks and twangs up there.
> I'd also bet that most of the keys, after a keyboard's broken in, 
> don't sound exactly alike -- wear and tear, typing patterns, etc. 
> You might be able to resolve ambiguities of interferometry by using 
> the sounds of the keys themselves. 
> 
>   Bear

For what very little it is worth, I have been told that this was
done quite sucessfully many many years ago with the old model 28
Teletype machines (anyone old enough to remember those ?) that made
quite characteristic noises as the typebox was positioned to print a
character (on a X, Y grid).   One can be sure that reading traffic from
the clatter of TTY machines was easier than a keyboard by interferometry
or key click sound signatures, but then the DSP required to do it was a lot
less readily available back then too...

Model 28s were widely deployed by the US government by the way,
and often used to print crypto traffic.

> 
>   
> 

-- 
Dave Emery N1PRE,  [EMAIL PROTECTED]  DIE Consulting, Weston, Mass. 
PGP fingerprint = 2047/4D7B08D1 DE 6E E1 CC 1F 1D 96 E2  5D 27 BD B0 24 88 C3 18





Re: NONSTOP Crypto Query

2001-01-13 Thread Ray Dillinger



>Ray Dillinger wrote:
>> 
>>  If you get two sensitive microphones in a room, you
>> should be able to do interferometry to get the exact locations
>> on a keyboard of keystrokes from the sound of someone typing.
>> I guess three would be better, but with some reasonable
>> assumptions about keys being coplanar or on a surface of known
>> curvature, two would do it.  Interesting possibilities.
>> 
>> Bear
>> 
>> [A quick contemplation of the wavelength of the sounds in question
>> would put an end to that speculation I suspect. --Perry]

We hear low-frequency sounds when we type.  But have we ever checked 
for high-frequency sounds outside of human hearing range?  I'd bet 
a keyboard has a number of squeaks and ticks and twangs up there.
I'd also bet that most of the keys, after a keyboard's broken in, 
don't sound exactly alike -- wear and tear, typing patterns, etc. 
You might be able to resolve ambiguities of interferometry by using 
the sounds of the keys themselves. 

Bear







Re: NONSTOP Crypto Query

2001-01-13 Thread Pat Farrell

At 01:30 AM 1/13/2001 +, Ben Laurie wrote:
>Hmm. 6 kHz has a wavelength of 5 cm. I would guess you can easily get
>resolution to 1/10 of a wavelength under ideal conditions. Which is .5
>cm, which is half the size of a key, more or less.

You don't have to locate the exact key to save a lot of complexity.

A standard PC keyboard has 47 keys on the main section.
Ignoring shifts, control, alt, combinations, etc. you have to deal with
47^N easy options per secret key of length N.

Lets assume you don't get the key as a fact from the sound inference,
but rather you get a probability density function that is weighted heavily
arround a single key, and then arround the keys "one key away" and
with decreasing probability for "two keys away" and so on until you get
to the maximum of 14 or so keys away.

If Ben's estimate is close to accurate, you should see a two standard deviation
circle of only 9 or so keys.

Since 47^6 is 229,345,008 and
 9^6 is only531,441
this technique can whack out a factor of 500 in the "likely" exhaustive 
search of
a six character passphrase. Obviously it saves more on longer passphrases.
It also saves more if the user enters control/alt/shift combinations.

Interesting.

Pat

Pat Farrell  voice:  (703 587-9898)
Alchemistemail:   [EMAIL PROTECTED]
OneBigCD, yourtext pager:  [EMAIL PROTECTED]
  Internet CD Jukebox  





Re: NONSTOP Crypto Query

2001-01-13 Thread David Wagner

In a paper on side channel cryptanalysis by John Kelsey, Bruce Schneier,
Chris Hall, and I, we speculated on possible meanings of NONSTOP and HIJACK:

   [...]
   It is our belief that most operational cryptanalysis makes use of
   side-channel information.  [...]  And Peter Wright discussed data
   leaking onto a transmission line as a side channel used to break a
   French cryptographic device [Wri87].

   The (unclassified) military literature provides many examples of
   real-world side channels.  [...]  Peter Wright's crosstalk anecdote
   is probably what the HIJACK codeword refers to [USAF98]. Along
   similar lines, [USAF98] alludes to the possibility that crosstalk from
   sensitive hardware near a tape player might modulate the signal on the
   tape; [USAF98] recommends that tapes played in a classified facility be
   degaussed before they are removed, presumably to prevent side channels
   from leaking. Finally, one last example from the military literature
   is the NONSTOP attack [USAF98, Chapters 3-4]: after a careful reading
   of unclassified sources, we believe this refers to the side channel
   that results when cryptographic hardware is illuminated by a nearby
   radio transmitter (e.g. a cellphone), thereby modulating the return
   signal with information about what the crypto gear is doing [AK98].
   [...]

   [AK98] R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission
  Using Electromagnetic Emanations," Proc. 2nd Workshop on
  Information Hiding, Springer, 1998.
   [USAF98] US Air Force, Air Force Systems Security Memorandum 7011--
  Emission Security Countermeasures Review, 1 May 1998.
   [Wri87] P. Wright, Spycatcher, Viking Penguin Inc., 1987.
   
The above is excerpted from the conclusions of
   J. Kelsey, B. Schneier, D. Wagner, C. Hall,
   "Side channel cryptanalysis of product ciphers",
   Journal of Computer Security, vol. 8, pp. 141--158, 2000.
   http://www.cs.berkeley.edu/~daw/papers/sidechan-final.ps

Do remember, please, that these are just guesses.

Also, credit is due to Ross Anderson and Markus Kuhn for informative
discussions on this topic.




Re: NONSTOP Crypto Query

2001-01-13 Thread Ben Laurie

Ray Dillinger wrote:
> 
> On Fri, 12 Jan 2001, John Young wrote:
> 
> >Wright also describes the use of supersensitive microphones
> >to pick up the daily setting of rotors on cryptomachines of the
> >time, in particular the Hagelins made by CryptoAG.
> 
> Hmmm.  That sounds like a trick that could be brought up to
> date.  If you get two sensitive microphones in a room, you
> should be able to do interferometry to get the exact locations
> on a keyboard of keystrokes from the sound of someone typing.
> I guess three would be better, but with some reasonable
> assumptions about keys being coplanar or on a surface of known
> curvature, two would do it.  Interesting possibilities.
> 
> Bear
> 
> [A quick contemplation of the wavelength of the sounds in question
> would put an end to that speculation I suspect. --Perry]

Hmm. 6 kHz has a wavelength of 5 cm. I would guess you can easily get
resolution to 1/10 of a wavelength under ideal conditions. Which is .5
cm, which is half the size of a key, more or less.

Sounds pretty feasible to me.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff




Re: NONSTOP Crypto Query

2001-01-13 Thread eli+

Ray Dillinger wrote:
> If you get two sensitive microphones in a room, you 
> should be able to do interferometry to get the exact locations 
> on a keyboard of keystrokes from the sound of someone typing.  

Interesting.  Probably not the easiest way to snoop, but you might be
driven to it.

> I guess three would be better, but with some reasonable 
> assumptions about keys being coplanar or on a surface of known 
> curvature, two would do it.  Interesting possibilities.

Interferometry like measuring the time delay between the two
microphones?  Defines a hyperboloid, which when intersected with the
keyboard still isn't specific enough, so I think you need three mics.

> [A quick contemplation of the wavelength of the sounds in question
> would put an end to that speculation I suspect. --Perry]

You can localize to better than the shortest wavelength present, so
the spectrum isn't obviously a problem.  Consider it under ideal
conditions -- anechoic, no transmission losses, omnidirectional
emission.  Then the mics get the same signal (at different times), and
you can just find peak correlations between them.

The required accuracy is roughly a centimeter, or 30 usec of sound
travel, over one sample at audio rates; adjust that trigonometrically
for mics placed other than 60 degrees apart.  Keystrokes are noisy and
should make decent correlation codes.  Less-than-ideal conditions
might make the scheme impossible, but I don't know how to conclude
that without a lot more work.

I don't know the state of the art, but a little web searching appears
to say that people can localize speech in a videoconferencing room to
within one 44-kHz sample.  http://www.ie.ncsu.edu/kay/msf/sound.htm

-- 
 Eli Brandt  |  [EMAIL PROTECTED]  |  http://www.cs.cmu.edu/~eli/




Re: NONSTOP Crypto Query

2001-01-13 Thread David Honig

At 01:37 PM 1/12/01 -0800, Ray Dillinger wrote:
>Hmmm.  That sounds like a trick that could be brought up to 
>date.  If you get two sensitive microphones in a room, you 

>[A quick contemplation of the wavelength of the sounds in question
>would put an end to that speculation I suspect. --Perry]

Maybe not, because you can use the click--- you look only at intensity
envelope, summing all frequencies essentially.

[Remember your basic science: you can't resolve something smaller than
half a wavelength. (Well, you can, with certain techniques, but things
get seriously hairy at that point, and in general the limit is half a
wavelength.) Given this, it is unlikely that you're going to figure
out whether the g or the h key was struck. If I'm wrong here, I'd like
to hear a detailed counterargument or evidence. --Perry]



Re: NONSTOP Crypto Query

2001-01-13 Thread John Young

Joel McNamara first told me about NONSTOP and its commonly
associated classified codeword, HIJACK, both somehow related
to Tempest. 

When you do a search on either of them you get hundreds 
(or 1000s) of hits for the generic terms "non-stop" and "hi-jack" 
but few entries for the codewords, and then as standards in 
military security documents. 

It's as if the codewords were picked to be camouflaged by the 
generics. And, because codewords are usually set to have
no relation to the protected material, they probably are not 
descriptive -- but could be, just to outfox the smarties.

The NONSTOP doc released to us was first issued in 1975 
and has gone through 4 reprintings, the latest in 1987. And 
it continues to be cited as still in effect, though usually such 
standards are updated at least every 5 years. So there may
be a later one which would account for its partial release
after first denial.

It's intriguing to read Spycatcher (1987) while reading the 
Tempest docs. I had not read Wright's most informative
book, and regret not having done so. (The Story of Hut 6,
too, by Gordon Welchman -- luckily found both in a
military used-bookstore.)

For those who have not read Spycatcher, Peter Wright 
was MI5's first scientist, and entered the service after 
WW2. He specialized in the technology of counterintelligence 
and with a few others cooked up a host of ingenious means
to spy on spies and suspects. A specialty was the
extraordinary use of electromagnetic science -- radio, 
telephone, acoustic, resonance, and more -- applying 
scientific abilities well in advance of technicians and 
engineers. Some of his ideas were so advanced his
bosses said impossible, until he proved effectiveness. 
Then Wright quickly became the savior of officers 
who could not understand why Britain's enemies kept 
outsmarting them -- usually with advanced technological 
means. Wright changed that, but often got at odds with 
non-scientific personnel whose faith was HUMINT.

Among others, he worked closely with GCHQ on occasion 
to provide technical attacks on cryptosystems which could 
not be broken by cryptanalysis. Thus his research on the 
cryptosecrets revealed by compromising emanations from 
devices, cabling, furniture, construction materials, and a host
of ordinary physical objects in and near cipher rooms -- all 
of which emitted signals that could be acquired and interpreted 
by careful tuning for comprehension. He writes of amazing 
methods of acquiring signals, and it is no wonder HMG 
fought to prevent publication of Spycatcher.

What he did not write about must be even more wondrous, 
and it makes you think he could pick up your brain waves
if you were part of particular triangulated antenna.

Maybe NONSTOP and HIJACK have nothing to do with
the stuff Wright excelled at. Still, reading Spycatcher
along with the Tempest docs -- and now Stephen
Budiansky's "Battle of Wits: The Complete Story of
Codebreaking in World War II," (2000) -- certainly
demonstrates how much of codebreaking has been
done by covert technical and physical means, even
as we are told misleading cover stories.

Are these latest crypto-revelations disinformation?
Historically nearly all have been.  Ha. Ha. Ha.






Re: NONSTOP Crypto Query

2001-01-12 Thread Ray Dillinger



On Fri, 12 Jan 2001, John Young wrote:

>Wright also describes the use of supersensitive microphones
>to pick up the daily setting of rotors on cryptomachines of the 
>time, in particular the Hagelins made by CryptoAG.

Hmmm.  That sounds like a trick that could be brought up to 
date.  If you get two sensitive microphones in a room, you 
should be able to do interferometry to get the exact locations 
on a keyboard of keystrokes from the sound of someone typing.  
I guess three would be better, but with some reasonable 
assumptions about keys being coplanar or on a surface of known 
curvature, two would do it.  Interesting possibilities.

Bear

[A quick contemplation of the wavelength of the sounds in question
would put an end to that speculation I suspect. --Perry]



Re: NONSTOP Crypto Query

2001-01-12 Thread Steven M. Bellovin

In message <[EMAIL PROTECTED]>, John Young write
s:
>
>This loops back to NONSTOP and the question of what may 
>be the signatures and compromising emanations of today's 
>cryptosystems which reveal information in ways that go beyond 
>known sniffers -- indeed, that known sniffers may divertingly 
>camouflage. 

Again going back to "Spycatcher", Wright described a number of other 
emissions.  For example, voices in a room could modulate the current 
flow through a telephone's ringer.  (This was, of course, back in the 
days of electromagnet-actuated ringers...)  One can also find signals 
corresponding to the plaintext superimposed on the output waveform of 
the ciphertext, and possibly see coupling to the power supply.  (One of 
the rules I've read:  "Step 1:  Look for the plaintext".)

I've seen brochures for high-grade encryptors that speak of "red-black 
separation" and separate power supplies for the two halves.


--Steve Bellovin, http:/www.research.att.com/~smb