Most companies including defence departments and NASA use air-gapped computer to store their most confidential data.
The researchers used the electromagnetic output from a laptop to conduct their attack.
EM emanations emitted during the decryption process, which were used by the researchers work out the targets key.
Researchers acquired the laptops private key by running GnuPG.
GnuPG is a widely famous implementation ofOpenPGP.
This shows that the attack is unwieldy.
The attacks legitimacy was tested by sending specific ciphertext to the target, which is basically an encrypted message.
The secret key was received after observation of around 66 decryption processes.
Each of these procedures lasted for 0.05 seconds.
This yielded overall measurement duration of around 3.3 seconds the paper established.
source: www.techworm.net