Skip to main content
main-content
Top

About this book

This book presents a model of electromagnetic (EM) information leakage based on electromagnetic and information theory. It discusses anti-leakage, anti-interception and anti-reconstruction technologies from the perspectives of both computer science and electrical engineering. In the next five years, the threat posed by EM information leakage will only become greater, and the demand for protection will correspondingly increase. The book systematically introduces readers to the theory of EM information leakage and the latest technologies and measures designed to counter it, and puts forward an EM information leakage model that has established the foundation for new research in this area, paving the way for new technologies to counter EM information leakage. As such, it offers a valuable reference guide for all researchers and engineers involved in EM information leakage and countermeasures.

Table of Contents

Frontmatter

Chapter 1. Introduction

Abstract
In the information age, information has become a key factor affecting a nation’s development and social progress. Due to the rapid development of large-scale integrated circuit, computer technology and information equipment, the cognition and definition of information are updating and developing constantly, forms and types of information, its representation and standardization, and methods of information dissemination are continuously enriching. From the perspective of information security, electromagnetic information can be divided into two categories: one is the information with the purpose of the transmission, such as the plain code or the encrypted code transmitted by telegraph equipment; the other one is the natural information of the equipment, the electromagnetic radiation or leakage to space. The former is the electromagnetic information transmitted for communication, which is active and intentional; the latter is the electromagnetic radiation or leakage of equipment, which is passive and unintentional.
Taikang Liu, Yongmei Li

Chapter 2. Electromagnetic Information Fundamental and Leakage Mechanism

Abstract
On the basis of the theory of electromagnetic radiation and information propagation, this chapter describes the generation of electromagnetic wave and mechanism of electromagnetic radiation leakage, and discusses the ways of electromagnetic information leakage of information devices and corresponding anti-leakage methods. In view of the internal relations and its ways of expression between the digital information and the electromagnetic radiation from the information devices, combining the principle of information theory, the electromagnetic information model is established; meanwhile, a model for reconstruction and reproduction under noise condition is given to answer the question whether the electromagnetic information intercepted would be able to be reconstructed and reproduced.
Taikang Liu, Yongmei Li

Chapter 3. Electromagnetic Information Interception and Reproduction

Abstract
The second chapter describes the electromagnetic information interception and data reconstruction, information reproduction model, in which the source refers to the leakage source and the sink refers to interception equipment. The electromagnetic information might be leaked when information equipment processes the data, and the leaked information might be intercepted and reproduced, thus information security will be threatened. The leaked electromagnetic signal that is intercepted from the information equipment could be reconstructed to reproduce the original information, which includes signal interception, data reconstruction, and information reproduction.
Taikang Liu, Yongmei Li

Chapter 4. Countermeasure Technology of Electromagnetic Information Leakage

Abstract
Information security is inevitably threatened by electromagnetic leakage, which is becoming a more and more prominent issue with the wider application of information facilities in security and confidential departments, banks, financial field, and so on and the improvement of the intellectualization degree of crime. So, it is very important to master and effectively utilize the countermeasure for electromagnetic leakage. This chapter puts forward hierarchical protection strategy for electromagnetic information leakage with the aim of “anti-leakage” and “anti-interception” and “anti-reconstruction”, and the new protection strategy is demonstrated in the form of specific cases on the basis of convention protection techniques.
Taikang Liu, Yongmei Li

Chapter 5. Protection Material of Electromagnetic Information Leakage

Abstract
Electromagnetic wave is a major way of electromagnetism energy transmission, which is radiated to outside when the high-frequency circuit operates. Since the electromagnetic waves radiated from the device are strongly related to the information being processed, they may cause information leakage and threat to information security.
Taikang Liu, Yongmei Li

Chapter 6. Electromagnetic Information Leakage and Protection

Abstract
Computer as information processing facility is pervasive in modern society, and information processing includes calculation, storage, transmission, exchange and so on. Components of computer play important roles during such processes; in the meantime, electromagnetic security issue exists. So, analysis of leakage sources and corresponding characteristics, and finding their effective solutions become main research issue. According to Chap. 4, a three-layered protective strategy was proposed. In this chapter, by analyzing specific cases of electromagnetic information leakage and protection, it was further verified that minimizing or keeping constant change of electromagnetic radiation signal is one of the most effective means.
Taikang Liu, Yongmei Li

Chapter 7. Data Process of Electromagnetic Information

Abstract
Importance of information security is determined by the value of information. Signal is the carrier of the information and data is its expression.
Taikang Liu, Yongmei Li

Chapter 8. Electromagnetic Information Leakage Testing

Abstract
The security level of information equipment can be assessed by testing. The correct test methods are selected according to different Device Under Testing (DUT) in the appropriate environment in order to ensure the accuracy.
Taikang Liu, Yongmei Li

Chapter 9. Standard Study of Electromagnetic Information Leakage and Countermeasures

Abstract
TEMPEST is another research field derived from EMC technology theory. There are two goals for EMC electromagnetic compatibility standard. One is to make sure the internal circuits of electronic equipment do not interfere with one another; the other is to enable the equipment to resist external electromagnetic interference. But the goal for TEMPEST protection standard of electromagnetic information leakage is to solve the problem of electromagnetic information leakage from the information equipment, and to decrease or even prevent electromagnetic information leakage, making it difficult for the eavesdropper to intercept or reproduce the leaked electromagnetic information. So, there are connections and distinctions between TEMPEST and EMC.
Taikang Liu, Yongmei Li

Backmatter

Additional information