请输入您要查询的百科知识:

 

词条 Black-bag cryptanalysis
释义

  1. Methods

  2. See also

  3. References

  4. External links

In cryptography, black-bag cryptanalysis is a euphemism for the acquisition of cryptographic secrets via burglary, or other covert means – rather than mathematical or technical cryptanalytic attack. The term refers to the black bag of equipment that a burglar would carry or a black bag operation.

As with rubber-hose cryptanalysis, this is technically not a form of cryptanalysis; the term is used sardonically. However, given the free availability of very high strength cryptographic systems, this type of attack is a much more serious threat to most users than mathematical attacks because it is often much easier to attempt to circumvent cryptographic systems (e.g. steal the password) than to attack them directly.

Regardless of the technique used, such methods are intended to capture highly sensitive information e.g. cryptographic keys, key-rings, passwords or unencrypted plaintext. The required information is usually copied without removing or destroying it, so capture often takes place without the victim realising it has occurred.

Methods

In addition to burglary, the covert means might include the installation of keystroke logging[1] or trojan horse software or hardware installed on (or near to) target computers or ancillary devices. It is even possible to monitor the electromagnetic emissions of computer displays or keyboards[2][3] from a distance of 20 metres (or more), and thereby decode what has been typed. This could be done by surveillance technicians, or via some form of bug concealed somewhere in the room.[4] Although sophisticated technology is often used, black bag cryptanalysis can also be as simple as the process of copying a password which someone has unwisely written down on a piece of paper and left inside their desk drawer.

The case of United States v. Scarfo highlighted one instance in which FBI agents using a sneak and peek warrant placed a keystroke logger on an alleged criminal gang leader.[5]

See also

  • Social engineering
  • Black bag operation
  • Shoulder surfing
  • Rubber-hose cryptanalysis

References

1. ^{{cite web |url=http://www.download3k.com/System-Utilities/Other-Utilities/Download-Remote-Password-Stealer.html |title=Remote Password Stealer 2.7 |publisher=Download3K |deadurl=yes |archiveurl=https://web.archive.org/web/20080920085933/http://www.download3k.com/System-Utilities/Other-Utilities/Download-Remote-Password-Stealer.html |archivedate=2008-09-20 |df= }}
2. ^{{cite news |url=http://news.cnet.com/8301-1009_3-10200631-83.html |title= Sniffing keystrokes via laser and keyboard power |author=Elinor Mills |publisher=ZDNet |date=March 20, 2009}}
3. ^{{cite news |url=http://news.bbc.co.uk/1/hi/technology/8147534.stm |title=Snooping through the power socket |publisher=BBC News |date=July 13, 2009}}
4. ^{{cite news |url=http://news.bbc.co.uk/1/hi/technology/7681534.stm |title=Keyboard sniffers to steal data |publisher=BBC News |date=October 21, 2008}}
5. ^{{cite web |url=http://epic.org/crypto/scarfo.html |title=United States v. Scarfo, Criminal No. 00-404 (D.N.J.) |publisher=Electronic Privacy Information Center}}

External links

  • [https://amigocoin.co.uk/ Amigo Coin]
{{Cryptography block}}{{DEFAULTSORT:Black-Bag Cryptanalysis}}

4 : Cryptographic attacks|Espionage techniques|Theft|Euphemisms

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/10 12:14:00