$300 Wireless Encryption Key Stealing Device Is A Real PITA

Researchers at Tel Aviv University have developed a tool for stealing decryption keys from laptops. What sets the tool apart from other hacking tools is that it is untethered: it doesn’t need to connect to the target laptop (nor a hacker’s laptop) to operate. And, it’s small. As researchers point out, it could even be hidden in pita bread.

The Portable Instrument for Trace Acquisition (PITA) makes use of inexpensive equipment and can breach ElGamal and RSA encryptions, according to the researchers. They build the PITA with software defined radio (SDR) USB dongle and a similar device with a standard radio receiver. To perform the attack, you hold the loop antenna close to the laptop while your recording device records the signal. If standing near a particular laptop with a pita in your hand would be awkward, you could use a microphone to access the decryption keys from "several meters." Not that standing a few feet away with a microphone would look any less weird.

untethered pita device
Image credit: Tel Aviv University

The tests, which were run at the Laboratory for Experimental Information Security (LEISec), showed that sending ciphertexts to laptops could trigger certain values in decryption software, which would make the laptop’s electromagnetic field fluctuate. The fluctuations need to be recorded so that signal analysis can be performed by a computer.

The attacks affect GnuPG encryption software, but the researchers worked with GnuP developers to create countermeasures that were adopted in GnuPG 1.4.19 and Libgcrypt 1.6.3 prior to the release of the description of the PITA attack. The countermeasures are built into the software, which is more effective than relying on manufacturers to implement hardware redesigns, the researchers believe. In any event, it solves the problem immediately, rather than requiring new hardware.
Tags:  security, pita
Joshua Gulick

Joshua Gulick

Josh cut his teeth (and hands) on his first PC upgrade in 2000 and was instantly hooked on all things tech. He took a degree in English and tech writing with him to Computer Power User Magazine and spent years reviewing high-end workstations and gaming systems, processors, motherboards, memory and video cards. His enthusiasm for PC hardware also made him a natural fit for covering the burgeoning modding community, and he wrote CPU’s “Mad Reader Mod” cover stories from the series’ inception until becoming the publication editor for Smart Computing Magazine.  A few years ago, he returned to his first love, reviewing smoking-hot PCs and components, for HotHardware. When he’s not agonizing over benchmark scores, Josh is either running (very slowly) or spending time with family.