Encyclopedia of Cryptography and Security

2005 Edition
| Editors: Henk C. A. van Tilborg


  • Markus Kuhn
Reference work entry
DOI: https://doi.org/10.1007/0-387-23483-7_427

The term TEMPEST was initially a US military codeword for a secret research project that originated in the late 1950s and studied compromising emanations. Later, it became the name of the resulting family of (still classified) US and NATO protection standards and test procedures for equipment and facilities that are specially shielded against the unwanted broadcast of sensitive information via spurious electromagnetic, acoustic and other emissions from information processing equipment. The term is sometimes also used as a synonym for compromising emanations and related protective measures in general.


  1. [1]
    Russel, D. and G.T. Gangemi (1991). Computer Security Basics. O'Reilly & Associates, Sebastopol, CA, Chapter 10: TEMPEST. ISBN 0-937175-71-4.Google Scholar
  2. [2]
    McNamara, Joel (1996–2002). “The complete, unofficial TEMPEST information page.” Internet Web page, http://www.eskimo.com/~joelm/tempest.html
  3. [3]
    NACSIM 5000. (1982). “TEMPEST fundamentals.” National Security Agency, Fort George G. Meade, MD, Partially declassified transcript: http://cryptome.org/nacsim-5000.htm

Copyright information

© International Federation for Information Processing 2005

Authors and Affiliations

  • Markus Kuhn

There are no affiliations available