Trigger of TEMPEST testing standard update

The TEMPEST security testing is to minimize computers and digital equipments from electromagnetic emanations and to achieve information security. With the performance boost of receiver sets, the testing standard must be updated. This paper designs a mathematical model for TEMPEST testing, analyzes the key factor's promotions, and recommends timing for the TEMPEST standard update.

[1]  Y. Yamanaka,et al.  Feasibility study for reconstruction of information from near field observations of the magnetic field of laser printer , 2006, 2006 17th International Zurich Symposium on Electromagnetic Compatibility.

[2]  Christof Paar,et al.  EM Side-Channel Attacks on Commercial Contactless Smartcards Using Low-Cost Equipment , 2009, WISA.

[3]  Markus G. Kuhn,et al.  Electromagnetic Eavesdropping Risks of Flat-Panel Displays , 2004, Privacy Enhancing Technologies.

[4]  Bin Yu,et al.  Analysis and Measurement on the Electromagnetic Compromising Emanations of Computer Keyboards , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.

[5]  Martin Vuagnoux,et al.  An improved technique to discover compromising electromagnetic emanations , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.

[6]  Hidema Tanaka,et al.  Information Leakage Via Electromagnetic Emanations and Evaluation of Tempest Countermeasures , 2007, ICISS.

[7]  Arie Yeredor,et al.  Dictionary attacks using keyboard acoustic emanations , 2006, CCS '06.

[8]  Hidema Tanaka,et al.  A Trial of the Interception of Display Image Using Emanation of Electromagnetic Wave , 2005 .

[9]  Takeshi Sugawara,et al.  Information leakage from cryptographic hardware via common-mode current , 2010, 2010 IEEE International Symposium on Electromagnetic Compatibility.

[10]  Paul C. Kocher,et al.  Differential Power Analysis , 1999, CRYPTO.

[11]  Francis Olivier,et al.  Electromagnetic Analysis: Concrete Results , 2001, CHES.

[12]  Kaori Fukunaga,et al.  Reconstruction of Printed Image Using Electromagnetic Disturbance from Laser Printer , 2007, IEICE Trans. Commun..

[13]  Li Yongmei,et al.  The study of the standards architecture and the standards attributes based on EMC standards and TEMPEST standards in computer system , 2013, 2013 8th International Conference on Computer Science & Education.

[14]  Li Yongmei,et al.  The Designing of TEMPEST Security Testing Model , 2014 .

[15]  H. Tanaka Information Leakage via Electromagnetic Emanation and Effectiveness of Averaging Technique , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[16]  W. V. Eck Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk? , 1996 .

[17]  Rakesh Agrawal,et al.  Keyboard acoustic emanations , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[18]  Li Yongmei,et al.  Designing eraser of secret information in EEPROM , 2010, 2010 5th International Conference on Computer Science & Education.

[19]  Peter Smulders,et al.  The threat of information theft by reception of electromagnetic radiation from RS-232 cables , 1990, Comput. Secur..

[20]  Feng Zhou,et al.  Keyboard acoustic emanations revisited , 2005, CCS '05.

[21]  Yu-ichi Hayashi,et al.  Information leakage from the unintentional emissions of an integrated RC oscillator , 2011, 2011 8th Workshop on Electromagnetic Compatibility of Integrated Circuits.