Tagged articles
4 articles
Page 1 of 1
Black & White Path
Black & White Path
May 6, 2026 · Information Security

Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance

Researchers from KTH demonstrated that a simple antenna placed about 1 meter from a Bluetooth device can capture RF emissions containing key‑related leakage, and using machine‑learning‑assisted analysis of roughly 90,000 traces they recover the full AES‑128 key, exposing a practical, non‑contact side‑channel threat and prompting hardware, firmware, and system‑level defenses.

AES-128BluetoothIoT security
0 likes · 7 min read
Remote Recovery of Bluetooth Chip AES‑128 Keys via RF Side‑Channel at Meter‑Scale Distance
Open Source Linux
Open Source Linux
Dec 11, 2023 · Information Security

Stealing Keys from Air‑Gapped PCs via Electromagnetic Eavesdropping

Researchers demonstrate a $3,000 electromagnetic detector that can capture encryption keys and other sensitive data from computers that are not connected to any network, revealing a fast, non‑intrusive side‑channel attack that bypasses traditional security measures.

Hardware HackingSide-channel attackair‑gapped security
0 likes · 5 min read
Stealing Keys from Air‑Gapped PCs via Electromagnetic Eavesdropping
Bilibili Tech
Bilibili Tech
Jun 28, 2022 · Information Security

Code Branch Avoidance Techniques in SM2 Elliptic Curve Cryptographic Implementations

The article explains how data‑dependent branches in SM2 elliptic‑curve implementations leak secret keys via power, EM, and cache side‑channels, compares point addition and doubling, critiques Montgomery ladder timing leaks, and proposes a branch‑free select‑based scalar multiplication to achieve constant‑time security at some performance cost.

Montgomery LadderSM2 cryptographySide-channel attack
0 likes · 11 min read
Code Branch Avoidance Techniques in SM2 Elliptic Curve Cryptographic Implementations