Everything Radiates: Does the Fourth Amendment Regulate Side-Channel Cryptanalysis?

61 Pages Posted: 9 Jan 2018

Date Written: September 2017

Abstract

Encryption shields private information from malicious eavesdroppers. After years of slow adoption, encryption is finally becoming widespread in consumer-oriented electronic devices and communications services. Consumer-oriented encryption software is now more user-friendly, and much of it turns on encryption by default. These advances enhance privacy and security for millions of people.

However, encryption also poses an impediment to law enforcement’s ability to gather electronic evidence. Law enforcement calls this the “going dark” problem. U.S. law enforcement agencies have responded through both legal and technological means to encryption’s perceived threat to their capabilities. The scope of encryption’s impact on those capabilities is not yet clear, and police still have a wealth of data and technical tools at their disposal. Nevertheless, sophisticated criminals can use encryption to stymie investigators, forcing them to resort to resource-intensive, tailored measures to investigate those individuals.

One means of doing so is through a “side-channel attack.” Our electronic devices are always radiating something—electromagnetic emissions, heat, and so forth. Those emissions reveal information, called “side channel information,” about the device. The physical implementation of a cryptosystem leaks electromagnetic emissions from which academic researchers have shown it is possible to extract the system’s secret encryption keys. Side-channel cryptanalysis is not a known law enforcement tactic at present, but that may change in time.

Law enforcement use of side-channel attacks will raise Fourth Amendment issues that will require a fact-intensive analysis to resolve. In determining what legal process (if any) will authorize a side-channel attack, a court will have to carefully examine what information will be acquired, from where, and how. The Supreme Court’s Fourth Amendment jurisprudence does not provide clear, predictable guidance for those inquiries. Its decision in Kyllo v. United States supplies the touchstone for the legal analysis of side-channel attacks. However, the Court’s current framework for electronic surveillance cannot adequately safeguard Americans’ privacy interests from erosion by technological advances.

Keywords: cryptography, Fourth Amendment, Kyllo v. United States, cryptanalysis, side-channel attacks, encryption

Suggested Citation

Pfefferkorn, Riana, Everything Radiates: Does the Fourth Amendment Regulate Side-Channel Cryptanalysis? (September 2017). Connecticut Law Review, Vol. 49, No. 5, 2017, Available at SSRN: https://ssrn.com/abstract=3096711

Riana Pfefferkorn (Contact Author)

Stanford Internet Observatory ( email )

Stanford, CA 94305
United States

Do you have negative results from your research you’d like to share?

Paper statistics

Downloads
211
Abstract Views
2,014
Rank
263,672
PlumX Metrics