Professional Documents
Culture Documents
Presented by,
REJIN R
S7-IT
Roll no:36
MOTIVATION
á We are now at a drastic world of terrorism activities. And recently
our nation has also been a victim of it.
á Can capture the signals through the walls of computer screens and
keystrokes of key board even the computer is not connected to a
network.
Ä Methods
1. External oscillator solution.
2. Recovery from the received signal
3. Cryptographic Display
Applications of TEMPEST
á Efficient Domestic surveillance technique for
Capturing terrorist communication.
á ATM sniffing
TEMPEST disadvantages
á Requires:
± High level of expertise and equipment to
decode captured waves
± Proximity to the target
± Long collection time
á Processing device: around $250,000
á Privacy become a forbidden dream.
Protection from TEMPEST
attacks
á TEMPEST testing and selection of appropriate devices
á TEMPEST Fonts(Soft TEMPEST)
á TEMPEST Proof walls
á TEMPEST Jamming
The text on the left is displayed with a conventional font, while the text on the right has been
filtered to remove the top 30% of the horizontal frequency spectrum. The graphics in the
upper row show the pixel luminosities, while below there are magnified screen photographs
of a 21´5 mm text area. While the user can see practically no difference between the fonts,
the filtered text disappears from the eavesdropping monitor while the normal text can be
received clearly.
CONCLUSION