Adi Shamir's birthday. Visual, geometric and neuro-cryptography
Shamir is S in R S A
Here he is so funny, with an accent, already 62 years old "patriarch of Israeli cryptography"
What is encrypted here?
Under the cut some achievements of the birthday ')
in 1977 , together with Ronald Rivest and Leonard Adleman, he developed the famous RSA public key cryptosystem
2006 Hacking RFID “Using a directional antenna and a digital oscilloscope, Shamir took readings of the power consumption of RFID chips and found fluctuations characteristic of the correct and incorrect bits of the password. “We can track when the chip, figuratively speaking,“ turns out to be dissatisfied ”with the sending of the“ wrong ”bit - at such moments its power consumption increases,” says prof. Shamir. - "Creating a complete and complete picture of the reactions of chips on different signals, thus, is not such a difficult problem."
2008Cubic attacks The “cubic” attack can be successfully applied to pseudo-random number generators used in GSM telephones and Bluetooth devices. Cell phones and RFID devices using stream ciphers are also vulnerable. ”Bruce Schneier
2013Acoustic Hacking RSA “Many computers make high-frequency sound during operation, due to vibrations in some electronic components,” explains Adi Shamir. “These acoustic emanations are more than annoying squeaks: they contain information about running software, including security-related calculations.”
RSA 2013 Conference I definitely think that cryptography is becoming less important. In reality, even the most secure computer systems in the most isolated places were hacked in recent years using a series of APT (Advanced Persistent Threat) attacks or other advanced techniques. We need to rethink how we build protection. ”A note in Hacker
2014, the latest article from Adi Shamir: "Get your hands off my laptop: physical side-channel key extraction attacks on PCs" Adi Shamir: “In addition to acoustics, a similar attack can be carried out by measuring the electrical potential of a computer case. To do this, a suitably equipped attacker simply touch the conductive parts of the case with his bare hand or connect to the ground contacts on the other end of the VGA, USB or Ethernet cable. "(2013) What the article says we will find out in September 2014