thumbnail of 1510360485852.jpg
thumbnail of 1510360485852.jpg
1510360485852 jpg
(69.64 KB, 396x291)
The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour, using the sound generated by the computer during the decryption of some chosen ciphertexts. We experimentally demonstrate that such attacks can be carried out, using either a plain mobile phone placed next to the computer, or a more sensitive microphone placed 4 meters away.

https://www.cs.tau.ac.il/~tromer/papers/acoustic-20131218.pdf