Conclusion
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards
Article REF: E1345 V1
Conclusion
Electromagnetic spying – TEMPEST Risks, analysis, validation and standards

Authors : Alain ALCARAS, Jean-François GAENG

Publication date: February 10, 2024 | Lire en français

Logo Techniques de l'Ingenieur You do not have access to this resource.
Request your free trial access! Free trial

Already subscribed?

8. Conclusion

The parasitic leakage of confidential information by compromising electromagnetic signals, and the capture of these signals by hostile individuals, constitute the TEMPEST (electromagnetic anti-compromission) risk. TEMPEST is not one of the areas aimed at attacking encryption systems; the TEMPEST risk is associated with a search for parasitic signals unintentionally emitted outside the ZST of the system to be protected.

The creation of parasitic signals, their coupling, the analysis and some of the measurements of these electromagnetic signals are all part of the field of EMC in parasitic emission. Skills, training, methods, tools, solutions and EMC standards for conducted, radiated or radio emission are required to deal with TEMPEST.

However, the TEMPEST risk differs from emission EMC problems in the following ways:

    ...
You do not have access to this resource.
Logo Techniques de l'Ingenieur

Exclusive to subscribers. 97% yet to be discovered!

You do not have access to this resource. Click here to request your free trial access!

Already subscribed?


Article included in this offer

"Electronics"

( 262 articles )

Complete knowledge base

Updated and enriched with articles validated by our scientific committees

Services

A set of exclusive tools to complement the resources

View offer details