LED printers and safe fonts as effective protection against the formation of unwanted emission

LED printers and safe fonts as effective protection against the formation of unwanted emission

Due to the widespread use of computer equipment, electromagnetic protection of processed data is still an issue. Structurally modi ed commercial equipment is used to protect devices against this phenomenon. The acquisition costs of such modi ed devices are enormous. However, the market offers information devices with very low susceptibility to electromagnetic in ltration. Safe fonts are a new solution in the protection of sensitive information against electromagnetic in ltration processes. The use of safe fonts not only increases resistance to electromagnetic eavesdropping but also makes it impossible. These devices are computer printers that use a slat with hundreds of LEDs arranged in several rows during the process of photoconductor exposure. The solution in the form of safe fonts is a universal method that protects process information against electromagnetic penetration. Safe fonts are effective not only for printers with slat LED. The solution can also be used for the protection of analog standard VGA, digital standard DVI, and printers with one diode and two diode laser systems.

___

  • [1] Choudary O, Kuhn MG. Template attacks on different devices. In: International Conference on Constructive Side- Channel Analysis and Secure Design; 2014. pp. 179-198.
  • [2] Kubiak I, Przybysz A. Electromagnetic protection of information and communication technology systems and networks. Telecommunication Review and Telecommunication News 2006; 12: 371-374 (article in Polish with an abstract in English).
  • [3] Ketenci S, Kayikcioglu T, Gangal A. Recognition of sign language numbers via electromyography signals. In: Signal Processing and Communications Applications Conference; 16{19 May 2015; Malatya, Turkey. pp. 2593-2596.
  • [4] Kuhn MG. Compromising Emanations: Eavesdropping Risks of Computer Displays. Technical Report. Cambridge, UK: University of Cambridge Computer Laboratory, 2003.
  • [5] Kuhn MG. Optical time-domain eavesdropping risks of CRT displays. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy; 12{15 May 2002; Berkeley, California, USA. pp. 3-18.
  • [6] Kubiak I. Video signal level (colour intensity) and effectiveness of electromagnetic in ltration. Bulletin of the Polish Academy of Sciences - Technical Sciences 2016; 64: 207-218.
  • [7] Kubiak I. The unwanted emission signals in the context of the reconstruct possibility of data graphics. International Journal of Image, Graphics and Signal Processing 2014; 11: 1-9.
  • [8] Kuhn MG. Electromagnetic eavesdropping risks of at-panel displays. In: Proceedings of the 4th Workshop on Privacy Enhancing Technologies; 26{28 May 2004; Toronto, Canada. pp. 88-105.
  • [9] Przybysz A. Emission security of DVI and HDMI interface. Telecommunication Review and Telecommunication News 2014; 7: 669-673 (article in Polish with an abstract in English).
  • [10] Grzesiak K, Przybysz A. Software raster generator. Telecommunication Review and Telecommunication News 2011; 11: 1596-1600 (article in Polish with an abstract in English).
  • [11] Cihan U, Ask U, Canturk K. Analysis of information leakages on laser printers in the media of electromagnetic radiation and line conductions. In: International Conference on Information Security and Cryptology; 30{31 October 2015; Ankara, Turkey. pp. 8-14.
  • [12] Cihan U, Ask U, Canturk K. Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines. Comput Secur 2016; 58: 250-267.
  • [13] Kubiak I, Przybysz A. The impact of commercial equipment design to electromagnetic protection of data process. Prz Elektrotechniczn 2015; 11: 41-44 (article in Polish with an abstract in English).
  • [14] Kubiak I. Digital (DVI) and analog (VGA) graphic standard in electromagnetic protection of text information. Telecommunication review and Telecommunication News 2014; 6: 413-416 (article in Polish with an abstract in English).
  • [15] Grzesiak K, Przybysz A. Emission security of laser printers. In: Military Communications and Information Systems Conference; 27{28 September 2010; Wroclaw, Poland. pp. 353-363.
  • [16] Kubiak I. Computer font resistant to electromagnetic in ltration process. Prz Elektrotechniczn 2014; 6: 207-215 (article in Polish with an abstract in English).
  • [17] Kubiak I. Null Pointer computer font{electromagnetic safe or not? Telecommunication Review and Telecommuni- cation News 2015; 1: 11-18 (article in Polish with an abstract in English).
  • [18] Cihan U, Ask U, Canturk K, Sarhat S, Bilal K, Ugur S. Automatic tempest test and analysis system design. International Journal on Cryptography and Information Security 2014; 4: 1-12.
  • [19] Kubiak I, Musial S. Hardware Raster Generator as a tool that supports electromagnetic in ltration. Telecommuni- cation Review and Telecommunication News 2011; 11: 1601-1607 (article in Polish with an abstract in English).
  • [20] Ketenci S, Gangal A. Automatic reduction of periodic noise in images using adaptive Gaussian star lter. Turk J Electr Eng Co 2017; 25: 2336-2348.
  • [21] Song TL, Jeong YR, Yook JG. Modeling of leaked digital video signal and information recovery rate as a function of SNR. IEEE T Electromagn C 2015; 57: 164-172.
  • [22] Loughry J, Umphress DA. Information leakage from optical emanations. ACM T Inform Syst Se 2002; 5: 262-289.