Wednesday, July 12, 2023

What is a side-channel attack?

Side-channel attacks are always connected with things like algorithms. But the fact is that the side-channel attack benefits some usually small but destructive vulnerabilities in physical infrastructure. In the worst case, people can have a straight line to see through the window what people are writing on their screens while they are walking on the streets. The side-channel attack means that the attacker benefits from physical vulnerabilities. 

In Wikipedia, the description of the side-channel attack goes like this. "In computer security, a side-channel attack is any attack based on extra information that can be gathered because of the fundamental way a computer protocol or algorithm is implemented, rather than flaws in the design of the protocol or algorithm itself (e.g. flaws found in cryptanalysis of a cryptographic algorithm) or minor, but potentially devastating, mistakes or oversights in the implementation. (Cryptanalysis also includes searching for side-channel attacks.) Timing information, power consumption, electromagnetic leaks, and sound are examples of extra information which could be exploited to facilitate side-channel attacks". (Wikipedia, Side-channel attack) 



The attacker uses things like changes in the electromagnetic activity or the hacker can benefit from information like suddenly happening needs to change passwords. The best example is the people who are working in some "interesting company", and they discuss in the restaurant about their work. Then somebody says that "There just came to the request to change the password, and I just changed it a couple of days ago". That information can tell hackers that there is something big going on. 

We all heard the term side-channel attack. That term means that somebody benefits from the physical vulnerability or structures in the system to get access to the targeted system. The side-channel attack could be the dropped paper there are passwords, eavesdropping with or without electronic systems. Even electronic system-based eavesdropping is not expensive or difficult. 

The hacker must just use something like a baby monitor that is hidden in the room. Or the hacker can put the microphone to the stethoscope and eavesdrop the victim through the wall and then the target will turn vulnerable. More advanced ways to make side-channel attacks are drones that monitor the computer's screens through windows and other sensors that can observe the changes in the electricity in wires. 

The attackers can follow the use of microprocessors. They can follow electromagnetic waves or they can follow the use of electricity in some buildings. If a thing like a supercomputer center starts to use lots of electricity that means something is happening. Sound is also the mark that something is going on in the computer rooms. If the coolers and ventilation start to act suddenly the computers are driving something heavy. That thing makes especially the computer centers vulnerable. 

The sound of the coolers is an effective way to get information about the time when the system makes something hard if there are only supercomputers. Same way certain persons that can connect with some kind of actions like military forces that are going in some computer firm with briefcases can tell that there is some kind of contract going on with that software firm and interesting organization. 

https://scitechdaily.com/mits-cybersecurity-metior-a-secret-weapon-against-side-channel-attacks/

https://en.wikipedia.org/wiki/Side-channel_attack

Saturday, July 1, 2023

Is math real or not? Or are virtual things real or not?


Mathematics plays a vital role in many everyday actions. Things like Pi and trigonometry are in a vital role in geometry used to measure things like houses. And mathematics is used to create quantum decimal numbers. That is used in modern data encryption. 

People sometimes say that mathematics is a virtual thing. So that means math is not real. Another thing is that the world is full of things that are not real or that we must not follow. But leaving those things unattended causes serious situations. Same way as in math. We can say that things like lawbooks are virtual things. Laws are "only" written texts. But breaking them can cause serious consequences. 

Things like traffic lights base are that people follow those orders like red lights "voluntarily". And there are strict rules about what people must do when they see red light. Of course, people can continue driving when they see that stop sign. But if the police see that thing, it causes punishment. And another thing is that driving against red light causes accidents. The question is is the law real or not? 




There is no natural force that makes people follow the laws. But then we must realize that following the law is always better, than following some instincts. Humans made lawbooks. That means the law is a virtual and artificial thing that people must follow. The law itself affects nothing, but authorities that enforce the law are a thing that affects people. 

Sometimes people have discussions about topics like this. Is mathematics a real thing or not? Mathematics follows certain rules. And all mathematical formulas must be solved by following certain rules. We know that 1+1=2. But we also can write on paper that 1+1=300, but that is not right. 

The reason for that is we didn't follow the rules of mathematics. Sometimes computers make mistakes because one of their gates has some kind of overvoltage. And they calculate that 1+1=3. That was the case when people realized how important error detection is. But then we must ask another question from ourselves. That question goes like this. Should we handle everything that affects us as the real thing? 


Math plays a vital role in modern mass encryption.


Mathematical formulas like Riemann's conjecture and Shor's algorithms are not topics in so-called everyday discussions. But those things are playing a vital role in data security. And they are the most used algorithms in everyday cryptology. Without those algorithms, we don't have things like GSM-network. The encryption in messages makes it possible that the devices can filter away information that doesn't mean to it.

 So the encryption allows the device to select only data packages that are for it. And that increases the operational range of things like encoded radio-control devices and allows to use of multiple systems in the same frequency. Also, the same algorithms protect things like online payments. But as I wrote earlier. Encryption is much more than only protecting some messages from outsiders. 


A digital twin of the computer program or otherways saying backup of source code can use to detect attempts to inject non-wanted code into the user interface. 


Active data security means that the system makes a backup using the confirmed code. Then the system protects the digital twin. Then the system compiles that "digital twin" with the application's source code that operates in the user interface. If there are changes between those codes that means the program is corrupted. Or somebody tries to inject non-wanted or non-authorized code into the system. 


But then we must ask, are virtual things real?


We can ask, are things that affect us real? Things like computer programs are quite similar thing as mathematics. Computer programs are only text on computer screens. But those things interact with other things. And without those codes the computers are useless. We can say that all computer programs are similar to machines. 

They don't do anything else than things that are encoded in them. So the computer program is like some kind of steam machine. It makes only things that programmers authorize it to make. All errors and damages that computer programs make. Are made by humans. 

The term digital twin means the virtual model of physical things. Those digital twins are used in some kinds of simulations. But then we can think of the case that the computer program makes a backup copy of itself. Could we say that the backup copy is also a digital twin? That backup is the twin of the virtual thing. The system can use that "twin" to observe code. And if the system compiles those codes with each other it can see does somebody try to change the code or slip malware in the system. 


Laser is the next-generation tool for communication.

Laser-communication systems are the tools that can turn the race of secured communication to the next level. The laser-communication tools are the same systems. The developers planned in the Star Wars program to use ASAT (Anti-Satellite) and ABM (Anti-Ballistic Missile) systems. The difference between those systems is the laser's power. The laser communication system with power adjusting is a tool that could use to protect satellites against incoming missiles. 

When a satellite detects an incoming missile, it will adjust the power of its communication laser to the destructive module. And then the same lasers can destroy that incoming missile. The laser-communication is the system that makes it harder to detect the satellite. And the laser system that developers install on the black of aircraft can make the next-generation GPS possible. 

The idea is that the photo-recon satellite follows those aircraft and that satellite sees those planes above the ground. And then those systems can exchange information with each other. The photo-recon satellite can simply send its camera image back to those aircraft. And then the pilot can precisely see where that aircraft is. The laser communication system is not as vulnerable to jammers as radio-based systems. 


"Illustration of NASA’s Laser Communications Relay Demonstration (LCRD communicating with the International Space Station over laser links. LCRD has successfully completed its first year of experiments, offering a glimpse into the future of data transmission from space. The system uses infrared light, allowing for 10 to 100 times more data to be packed into a single transmission compared to traditional radio wave systems. Credit: NASA’s Goddard Space Flight Center. (ScitechDaily.com/NASA’s Laser Communications Relay: Showcasing the Future of Space Data Transmission)




Above: AGM-88 HARM

The AGM-88A HARM-style anti-radiation missiles can destroy things like GPS satellites, radar, and communication facilities. Those missiles can also use against any radio source in the world. Anti-radiation missiles can destroy things like internet support stations and TV network stations. So military operators can use it to deny the effect of enemy propaganda. 

When we think about jammer systems and missiles. We might think that jamming the GPS is a piece of cake. But the jammer systems have one very serious problem. The active jammer system sends electromagnetic radiation around it. So the anti-radar missiles are capable to destroy those jammer systems. And those missiles can shoot against space-borne systems. 

When a jammer operates, the ECCM (Electronic Counter-Counter Measurement) systems start their counter-actions against those jammers. When the jammer starts to send its radio transmission at a certain frequency that covers the GPS, the counter system aims things like AGM-88 HARM missiles at that jammer platform. 

The aircraft that uses jammers is the radio source. And anti-radiation missiles can aim at those aircraft. The next-generation ECM systems use the AI-based power adjustments and in those systems, the counter wave has precisely the same power and frequency as the incoming wave movement. 

The system could use drones. They are flying at a certain distance from the aircraft to detect and analyze incoming radiowaves. Then those drones send the vital information to the manned aircraft's computer that adjusts counter-waves to the precise right energy level. 

Same way anti-radiation missiles can be a threat to combat aircraft. The same system that makes them aim at enemy radars makes anti-radiation missiles aim at all radio sources. Those anti-radiation missiles can be dangerous also to things like radio operators and jammer systems. The new jammer systems are not the same way vulnerable as old fashion systems. In modern systems, the AI adjusts the radio transmission to the level that the counter-wave will not just reflect the radar. 


https://scitechdaily.com/nasas-laser-communications-relay-showcasing-the-future-of-space-data-transmission/?expand_article=1

https://www.globalsecurity.org/military/systems/munitions/agm-88-pics.htm

Superhydrophobic materials can be more fundamental than we think.

"Research on metal-organic frameworks has led to the development of superhydrophobic surfaces by grafting hydrocarbon chains, which cre...