One interesting question is exactly how strong radio frequency
illumination could cause compromise of information being processed by
electronic equipment. I have an idea for a mechanism whereby such
illumination could induce generation of harmonic and beat frequencies
that are modulated by internal data signals.
This mechanism is based on an effect that is familiar to ham radio
operators, who are often bedeviled by neighbors complaining of
television interference. Here is a quote from the chapter on
interference in an old (1974) edition of the ARRL Radio Amateur's
Handbook:
"Harmonics by Rectification"
"Even though the transmitter is completely free from harmonic output
it is still possible for interference to occur because of harmonics
generated outside the transmitter. These result from rectification of
fundamental-frequency currents induced in conductors in the vicinity
of the transmitting antenna. Rectification can take place at any
point where two conductors are in poor electrical contact, a
condition that frequently exists in plumbing, downspouting, BX cables
crossing each other, ... It can also occur ... in power supplies,
speech equipment, etc. that may not be enclosed in the shielding
about the RF circuits."
In the case of computer equipment, the conductor could be a wire,
external cable or even a trace on a printed circuit board. Now
imagine that the source of rectification is not a poor connection,
but a transistor junction in a logic gate or line driver. As that
device is switched on and off, RF rectification may be switched on
and off as well, modulating the generated harmonic with the input
signal. If that signal carries sensitive information, all the
information would be broadcast on the harmonic output. Keyboard
interfaces, video output circuits and serial line drivers come to
mind as excellent candidates for this effect, since they often carry
sensitive information and are usually connected to long wires that
can absorb the incident RF energy and radiate the harmonics.
All an attacker has to do is monitor a site transmitting at frequency
f and analyze any signals at 2*f, 3*f, etc. If the site has more than
one transmitter, say a command hut, or a naval ship, there are also
beat frequencies to consider f1+f2, f1-f2, 2*f1+f2, 2*f1-f2, etc.
Note that harmonics and beats radiated from the equipment under
attack are vastly easier to detect that any re-radiation at the
fundamental frequency, which would be swamped by the primary
transmitter's signal.
There is also a potential active attack where an adversary
frequency-sweeps your equipment with RF hoping to find a parasitic
harmonic generator. This might be the "resonance" technology Peter
Wright referred to. If the source illumination causes a resonance
by, say, operating at 1/4 the electrical wavelength of the video
output cable, any effect might be magnified greatly. (The even
harmonics would be suppressed, but odd harmonics would not be.)
Illumination could be done directly or over telephone, cable TV or
power lines.
This might also explain "NONSTOP testing and protection being
especially needed on vehicles, planes and ships." since they often
carry multiple radio transmitters and are more easily exposed to
monitoring and external illumination than a fixed site inside a
secure perimeter.
The two code names (NONSTOP and HIJACK) might possibly refer to the
passive and active modes. Or NONSTOP may refer to radiated signals
and HIJACK to signals over hardwire lines. Or one could cover all the
effects I am proposing and the other something completely different.
Whatever.
FWIW,
Arnold Reinhold
At 2:23 AM +0000 1/13/2001, David Wagner wrote:
>In a paper on side channel cryptanalysis by John Kelsey, Bruce Schneier,
>Chris Hall, and I, we speculated on possible meanings of NONSTOP and HIJACK:
>
> [...]
> It is our belief that most operational cryptanalysis makes use of
> side-channel information. [...] And Peter Wright discussed data
> leaking onto a transmission line as a side channel used to break a
> French cryptographic device [Wri87].
>
> The (unclassified) military literature provides many examples of
> real-world side channels. [...] Peter Wright's crosstalk anecdote
> is probably what the HIJACK codeword refers to [USAF98]. Along
> similar lines, [USAF98] alludes to the possibility that crosstalk from
> sensitive hardware near a tape player might modulate the signal on the
> tape; [USAF98] recommends that tapes played in a classified facility be
> degaussed before they are removed, presumably to prevent side channels
> from leaking. Finally, one last example from the military literature
> is the NONSTOP attack [USAF98, Chapters 3-4]: after a careful reading
> of unclassified sources, we believe this refers to the side channel
> that results when cryptographic hardware is illuminated by a nearby
> radio transmitter (e.g. a cellphone), thereby modulating the return
> signal with information about what the crypto gear is doing [AK98].
> [...]
>
> [AK98] R. Anderson and M. Kuhn, "Soft Tempest: Hidden Data Transmission
> Using Electromagnetic Emanations," Proc. 2nd Workshop on
> Information Hiding, Springer, 1998.
> [USAF98] US Air Force, Air Force Systems Security Memorandum 7011--
> Emission Security Countermeasures Review, 1 May 1998.
> [Wri87] P. Wright, Spycatcher, Viking Penguin Inc., 1987.
>
>The above is excerpted from the conclusions of
> J. Kelsey, B. Schneier, D. Wagner, C. Hall,
> "Side channel cryptanalysis of product ciphers",
> Journal of Computer Security, vol. 8, pp. 141--158, 2000.
> http://www.cs.berkeley.edu/~daw/papers/sidechan-final.ps
>
>Do remember, please, that these are just guesses.
>
>Also, credit is due to Ross Anderson and Markus Kuhn for informative
>discussions on this topic.