The term TEMPEST was initially a US military codeword for a secret research project that originated in the late 1950s and studied compromising emanations. Later, it became the name of the resulting family of (still classified) US and NATO protection standards and test procedures for equipment and facilities that are specially shielded against the unwanted broadcast of sensitive information via spurious electromagnetic, acoustic and other emissions from information processing equipment. The term is sometimes also used as a synonym for compromising emanations and related protective measures in general.
References
Russel, D. and G.T. Gangemi (1991). Computer Security Basics. O'Reilly & Associates, Sebastopol, CA, Chapter 10: TEMPEST. ISBN 0-937175-71-4.
McNamara, Joel (1996–2002). “The complete, unofficial TEMPEST information page.” Internet Web page, http://www.eskimo.com/~joelm/tempest.html
NACSIM 5000. (1982). “TEMPEST fundamentals.” National Security Agency, Fort George G. Meade, MD, Partially declassified transcript: http://cryptome.org/nacsim-5000.htm
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 International Federation for Information Processing
About this entry
Cite this entry
Kuhn, M. (2005). Tempest. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_427
Download citation
DOI: https://doi.org/10.1007/0-387-23483-7_427
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-23473-1
Online ISBN: 978-0-387-23483-0
eBook Packages: Computer ScienceReference Module Computer Science and Engineering