WeizmannInstituteOfScience

Latest

  • Computers share their secrets if you listen

    by 
    Michael Gorman
    Michael Gorman
    12.20.2013

    Be afraid, friends, for science has given us a new way in which to circumvent some of the strongest encryption algorithms used to protect our data -- and no, it's not some super secret government method, either. Researchers from Tel Aviv University and the Weizmann Institute of Science discovered that they could steal even the largest, most secure RSA 4,096-bit encryption keys simply by listening to a laptop as it decrypts data. To accomplish the trick, the researchers used a microphone to record the noises made by the computer, then ran that audio through filters to isolate the vibrations made by the electronic internals during the decryption process. With that accomplished, some cryptanalysis revealed the encryption key in around an hour. Because the vibrations in question are so small, however, you need to have a high-powered mic or be recording them from close proximity. The researchers found that by using a highly sensitive parabolic microphone, they could record what they needed from around 13 feet away, but could also get the required audio by placing a regular smartphone within a foot of the laptop. Additionally, it turns out they could get the same information from certain computers by recording their electrical ground potential as it fluctuates during the decryption process. Of course, the researchers only cracked one kind of RSA encryption, but they said that there's no reason why the same method wouldn't work on others -- they'd just have to start all over to identify the specific sounds produced by each new encryption software. Guess this just goes to prove that while digital security is great, but it can be rendered useless without its physical counterpart. So, should you be among the tin-foil hat crowd convinced that everyone around you is a potential spy, waiting to steal your data, you're welcome for this newest bit of food for your paranoid thoughts.

  • The nose knows... how to let quadriplegics move and speak (video)

    by 
    Sean Hollister
    Sean Hollister
    07.27.2010

    We've seen quadriplegic transportation directed by brainwaves, speech and even the occasional Wiimote, but your best bet might be to follow your nose. Israeli nasal researchers at the Weizmann Institute of Science unveiled a "sniff controller" this week, that measures nasal pressure to control a wheelchair joystick with surprising precision (see a video after the break) and a specially-developed typing interface. The latter is likely the more important advancement, as Discover heartwarmingly reports at the source link, by giving patients with locked-in syndrome (a la The Diving Bell and the Butterfly) the long-lost ability to speak. Best of all, the technology is inexpensive compared to alternatives on the market; while a Stephen Hawking-esque eye-tracking system can cost tens of thousands of dollars, Weizmann scholars reportedly pieced the prototype together for $358. The device is already being considered for public availability by the institute's technology transfer company, Yeda R&D -- find out just how it works in the full study at our more coverage link.

  • 3G GSM encryption cracked in less than two hours

    by 
    Richard Lai
    Richard Lai
    01.15.2010

    Looks like all that GSM code-cracking is progressing faster than we thought. Soon after the discovery of the 64-bit A5/1 GSM encryption flaw last month, the geniuses at Israel's Weizmann Institute of Science went ahead and cracked the KASUMI system -- a 128-bit A5/3 algorithm implemented across 3G networks -- in less than two hours. If you must know, the method applied is dubbed 'related-key sandwich attack' where multiple values of known differentials are processed through the first seven rounds of KASUMI, then using resulting quartets that are identified sharing key differences, subkey materials can be obtained in round eight to build up the 128-bit key. Sure, it's hardly snooping-on-the-go at this speed, but worryingly this was only an 'unoptimized implementation... on a single PC.' At the same time, the paper condemns the presumably red-faced GSM Association for moving from MISTY -- a more computationally-expensive but much stronger predecessor algorithm -- to KASUMI. Guess we'll just have to stick with Skype.

  • DNA computer solves logical problems, inches closer to practical use

    by 
    Vlad Savov
    Vlad Savov
    08.10.2009

    The world of biomolecular computing is hardly a lonely place: bacteria, enzymes, and all manner of chemicals have already been used to perform basic automated tasks. DNA computers are arguably the most advanced organic form of "autonomous programmable computing devices," with one already boasting a pretty tight game of Tic-Tac-Toe. The latest, put together by the Israeli Weizmann Institute, advances things with its ability to correctly respond to problems of logic. By feeding molecular rules and facts into the system, the researchers are able to program DNA strands to produce yes and no answers to basic questions. Programming is said to be technically identical to that used in electronic devices, with a robot compiler converting the programming language into molecular-level information. The ultimate aim of the project is to produce miniscule disease-fighting bots that can battle infections within the human body -- provided the DNA-programming drones don't go all Yul Brynner on us.[Thanks, Karl]