• @PhantomPhanaticOP
    link
    English
    31 year ago

    Yeah, I pulled the paper as well since I was curious. As far as I understand it, for the card reader, they use the data they get from the LED to help with solving the key. The LEDs leak crucial information about each encryption calculation and some specific calculations give away more info than others so they had to capture many key exchanges. Not super useful in most cases but it demonstrates a novel way to observe leaked info.

    I’ll add a link to the paper to the post for easier access.

    • mo_ztt ✅
      link
      English
      21 year ago

      Sounds good to me. Like I say it’s still extremely impressive; there’s no need to omit the “and they also did a conventional attack at the same time which the LED helped with” part for it to be a great story.