[Cryptography] Radio leakage from System 360/370 era machines

Bob Wilson wilson at math.wisc.edu
Fri Feb 14 16:54:01 EST 2020


In Volume 2, Issue 8, Henry Baker comments on "listening" to old 
mainframes using a radio:
> BTW, IBM mainframes had powerful radio side-channels: in the early 
> 1960's, one of the programmers that worked with me used to put an 
> ordinary portable radio on top of the IBM CPU so that he could 
> "listen" to his program go through its paces. Any change in the audio 
> would indicate a problem with the software.
In fact that was not an accident, in some cases it was a documented 
feature. It was a part of other systems, but my experience with it was 
with CDC 1604 and 3600 machinery. There was a speaker in the operator's 
console, driven by the upper octal digit of the accumulator. DC current 
proportional to that digit was fed through the speaker. As an example, 
if you put 0707070707070707 (sixteen digits octal, to fill the 48 bit 
register) in the A register and then rotated it left or right, delay, 
rotate, delay, etc. you got a square wave sound out of the speaker. More 
creative strings of digits could create lots of different sounds. I 
remember a diagnostic that CDC's onsite engineers ran that was called 
"Bagpipe", because that is what it sounded like.

I remember one programmer whose intense numeric calculations would make 
the speaker go quiet, because the A register was changing at a rate 
above human hearing during his intense computations. Operators had 
learned that if programs in general shut up the speaker it meant the 
machine was in a small tight loop, so they would interrupt the run and 
kick his program off the machine. So the first thing his code would do 
was to modify system code (this was before there was much in the way of 
separation between user code and system code, there was one big address 
space for us all to play in) and if the operator changed a switch 
setting so as to kick him off, he printed out on the console typewriter 
a message to keep their (text suppressed in interests of decency) hands 
off the switch, and telling the operator another way to stop the program 
if it were really necessary.

So if you consider that audio information as leakage, it was endorsed by 
the system designers! Also, listening that way or using a radio to 
listen in on activity with other machines was used to play music, back 
in the day when we had to demonstrate the machine to visitors.

Bob W
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://www.metzdowd.com/pipermail/cryptography/attachments/20200214/89f3bbc8/attachment.htm>


More information about the cryptography mailing list