SlideShare une entreprise Scribd logo
1  sur  25
Analiza kvalitete kriptografskih sustava sa nepoznatim kriptoalgoritmima Tonimir Ki šasondi, dipl.inf  prof.dr.sc. Željko Hutinski 2009
Tema rada: ,[object Object],[object Object],[object Object]
Element promatranja: Promatramo simetrične sustave: C = f(M,K) -> M = f(C,K)‏ f -> aes, des, 3des, bf, tf, rc4 M -> tekst C -> kriptotekst K -> ključ Uvijek pretpostavljamo Kerckhoffov princip -> Sustav je siguran ako poznajemo C,f
Element promatranja: Software: dm-crypt/LUKS TrueCrypt GnuPG OpenSSL ...
dm-crypt/LUKS Open Source disk enkripcija pod Linux baziranim OS. ~# cryptsetup luksDump /dev/sda2  LUKS header information for /dev/sda2 Version:  1 Cipher name:  aes Cipher mode:  cbc-essiv:sha256 Hash spec:  sha1 Payload offset: 2056 MK bits:  256 .... Key Slot 0: ENABLED ....
TrueCrypt TrueCrypt – Multiplatform disk enkripcija ~#  truecrypt -vl /dev/mapper/truecrypt0: Volume: /dev/sda3 Type: Normal Size: 743836745728 bytes Encryption algorithm: AES Mode of operation: LRW Read-only: No Hidden volume protected: No
GnuPG GnuPG -> Multiplatform -----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.9 (GNU/Linux)‏ jA0EAwMCvRtDZw+LN1hgycBqQ9zXPb8VQRdBXMB1lxdMVeKtz6V4VctbmMctHUQhZtKOZ0gfCi1M3cpqP.....Wi/s/yzqQRP8dtgn/skgxEZHfs3HEuprpzrifaf9RNuyV284xfJooN8KI9uVB0g/omtnZeWl73EacbeKJO4I4Pcp5Q870JA== =EanM -----END PGP MESSAGE-----
GnuPG GnuPG -> Multiplatform -----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.9 (GNU/Linux)‏ jA0EAwMCvRtDZw+LN1hgycBqQ9zXPb8VQRdBXMB1lxdMVeKtz6V4VctbmMctHUQhZtKOZ0gfCi1M3cpqP.....Wi/s/yzqQRP8dtgn/skgxEZHfs3HEuprpzrifaf9RNuyV284xfJooN8KI9uVB0g/omtnZeWl73EacbeKJO4I4Pcp5Q870JA == =EanM -----END PGP MESSAGE----- Base64 Encoding
GnuPG RFC 2440 ->  http://www.ietf.org/rfc/rfc2440.txt Algorithm Identifier -> Numeric ~$ gpg --list-packets cuc.txt.asc  :symkey enc packet: version 4, cipher 3, s2k 3, hash 2 salt e6200e71482390e9, count 65536 (96)‏ gpg: CAST5 encrypted data Enter passphrase:  gpg: Interrupt caught ... exiting
GnuPG Ref: RFC 2440 1  ← IDEA 2  ← 3DES 3  ← CAST5 4  ← Blowfish 7  ← AES (128)‏ 8  ← AES192 9  ← AES256 10 ← Twofish
OpenSSL ~/openssl$ openssl enc -aes-256-cbc -in file -out file.enc enter aes-256-cbc encryption password: Verifying - enter aes-256-cbc encryption password: ~/openssl$ openssl enc -d -aes-256-ecb -in file.enc -out file.dec enter aes-256-ecb decryption password: bad decrypt 5653 :error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:461:
Isplativost za štite : Postoji više napada koji mogu zaobići disk enkripciju: Uvjet: Računalo radi (locked) ili je u sleepu te napadač ima fizički pristup stroju Cold boot attacks Evil maid attacks (npr, Bootkits) Keyloggeri i sl.
Implementacije: Nepoznati algoritam otežava kriptoanalizu U većini slučajeva – može se doznati iz sadržaja i nije adekvatna zaštita Ručna implementacija – Dodatno otežavanje kriptoanalize Koristite javno poznate i provjerene algoritme Fizički pristup automatski podrazumijeva mogućnost proboja
Implementacije:
Grafički prikaz: Vlastita implementacija toolkita za analizu kriptosadržaja u pythonu: Analiza kriptoteksta, entropijska analiza... Vizualizacija pomoću SciPy Redukcija sadržaja + koloracija po byteu.
0x00, File dump – redukcija na 7 :
Blowfish u ECB modu – redukcija na 7 :
Blowfish u CBC načinu – redukcija na 7 :
Implementacija algoritma: Sekvencijalni načini rada – ECB odavaju mogućnost analize sadržaja (npr, 0x00, 0xFF itd.)‏ Prazni segmenti diska, poznata zaglavlja datoteka, poznate datoteke... Omogućavamo napadaču “Chosen-plaintext” napad, kad zapravo mislimo da imamo “Ciphertext only” napad Koristite CBC ili  GCM   na čin rada!
Slabost vjerodostojnica: Lozinke ili Passfraze koje se koriste za kriptografske ključeve su slabije nego što ljudi vjeruju. 128 bitni ključ = 16 byteova (16 znakova)‏ ASCII = 94 printabilna znaka (161 non-printabilna)‏ Realno – Manje od 37% ukupnog spektra U praksi = 112 bitni ključ
Analiza korisničkih lozinki: e ainsrtoludmckgphvbfyzjw   'qxSA&quot;CETMNBP`ILRDG /HFKOWUVJZ^X.YQ&+,48!()1{:?03#9567=%$@|*;_<}][>~ perica22 perica22! (a0, a0! …)
Učinkovitost kriptoanaliti čkih  napada: Napadi na algoritam: Kriptoanalitički napad = 2^64 -> 2^63 2^64/2^63 =  2 AES192 - > Kompleksnost napada 2^192   -> CPT napad  2^176   ->  65536x jednostavnije   -> 100k god. / 65536 = 1.5god.
Efekt sinergije: ,[object Object],[object Object],[object Object]
Umjesto zaključka: ,[object Object],[object Object],[object Object],[object Object]
Hvala ,[object Object],[object Object]

Contenu connexe

En vedette

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

En vedette (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

CUC2009

  • 1. Analiza kvalitete kriptografskih sustava sa nepoznatim kriptoalgoritmima Tonimir Ki šasondi, dipl.inf prof.dr.sc. Željko Hutinski 2009
  • 2.
  • 3. Element promatranja: Promatramo simetrične sustave: C = f(M,K) -> M = f(C,K)‏ f -> aes, des, 3des, bf, tf, rc4 M -> tekst C -> kriptotekst K -> ključ Uvijek pretpostavljamo Kerckhoffov princip -> Sustav je siguran ako poznajemo C,f
  • 4. Element promatranja: Software: dm-crypt/LUKS TrueCrypt GnuPG OpenSSL ...
  • 5. dm-crypt/LUKS Open Source disk enkripcija pod Linux baziranim OS. ~# cryptsetup luksDump /dev/sda2 LUKS header information for /dev/sda2 Version: 1 Cipher name: aes Cipher mode: cbc-essiv:sha256 Hash spec: sha1 Payload offset: 2056 MK bits: 256 .... Key Slot 0: ENABLED ....
  • 6. TrueCrypt TrueCrypt – Multiplatform disk enkripcija ~# truecrypt -vl /dev/mapper/truecrypt0: Volume: /dev/sda3 Type: Normal Size: 743836745728 bytes Encryption algorithm: AES Mode of operation: LRW Read-only: No Hidden volume protected: No
  • 7. GnuPG GnuPG -> Multiplatform -----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.9 (GNU/Linux)‏ jA0EAwMCvRtDZw+LN1hgycBqQ9zXPb8VQRdBXMB1lxdMVeKtz6V4VctbmMctHUQhZtKOZ0gfCi1M3cpqP.....Wi/s/yzqQRP8dtgn/skgxEZHfs3HEuprpzrifaf9RNuyV284xfJooN8KI9uVB0g/omtnZeWl73EacbeKJO4I4Pcp5Q870JA== =EanM -----END PGP MESSAGE-----
  • 8. GnuPG GnuPG -> Multiplatform -----BEGIN PGP MESSAGE----- Version: GnuPG v1.4.9 (GNU/Linux)‏ jA0EAwMCvRtDZw+LN1hgycBqQ9zXPb8VQRdBXMB1lxdMVeKtz6V4VctbmMctHUQhZtKOZ0gfCi1M3cpqP.....Wi/s/yzqQRP8dtgn/skgxEZHfs3HEuprpzrifaf9RNuyV284xfJooN8KI9uVB0g/omtnZeWl73EacbeKJO4I4Pcp5Q870JA == =EanM -----END PGP MESSAGE----- Base64 Encoding
  • 9. GnuPG RFC 2440 -> http://www.ietf.org/rfc/rfc2440.txt Algorithm Identifier -> Numeric ~$ gpg --list-packets cuc.txt.asc :symkey enc packet: version 4, cipher 3, s2k 3, hash 2 salt e6200e71482390e9, count 65536 (96)‏ gpg: CAST5 encrypted data Enter passphrase: gpg: Interrupt caught ... exiting
  • 10. GnuPG Ref: RFC 2440 1 ← IDEA 2 ← 3DES 3 ← CAST5 4 ← Blowfish 7 ← AES (128)‏ 8 ← AES192 9 ← AES256 10 ← Twofish
  • 11. OpenSSL ~/openssl$ openssl enc -aes-256-cbc -in file -out file.enc enter aes-256-cbc encryption password: Verifying - enter aes-256-cbc encryption password: ~/openssl$ openssl enc -d -aes-256-ecb -in file.enc -out file.dec enter aes-256-ecb decryption password: bad decrypt 5653 :error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:461:
  • 12. Isplativost za štite : Postoji više napada koji mogu zaobići disk enkripciju: Uvjet: Računalo radi (locked) ili je u sleepu te napadač ima fizički pristup stroju Cold boot attacks Evil maid attacks (npr, Bootkits) Keyloggeri i sl.
  • 13. Implementacije: Nepoznati algoritam otežava kriptoanalizu U većini slučajeva – može se doznati iz sadržaja i nije adekvatna zaštita Ručna implementacija – Dodatno otežavanje kriptoanalize Koristite javno poznate i provjerene algoritme Fizički pristup automatski podrazumijeva mogućnost proboja
  • 15. Grafički prikaz: Vlastita implementacija toolkita za analizu kriptosadržaja u pythonu: Analiza kriptoteksta, entropijska analiza... Vizualizacija pomoću SciPy Redukcija sadržaja + koloracija po byteu.
  • 16. 0x00, File dump – redukcija na 7 :
  • 17. Blowfish u ECB modu – redukcija na 7 :
  • 18. Blowfish u CBC načinu – redukcija na 7 :
  • 19. Implementacija algoritma: Sekvencijalni načini rada – ECB odavaju mogućnost analize sadržaja (npr, 0x00, 0xFF itd.)‏ Prazni segmenti diska, poznata zaglavlja datoteka, poznate datoteke... Omogućavamo napadaču “Chosen-plaintext” napad, kad zapravo mislimo da imamo “Ciphertext only” napad Koristite CBC ili GCM na čin rada!
  • 20. Slabost vjerodostojnica: Lozinke ili Passfraze koje se koriste za kriptografske ključeve su slabije nego što ljudi vjeruju. 128 bitni ključ = 16 byteova (16 znakova)‏ ASCII = 94 printabilna znaka (161 non-printabilna)‏ Realno – Manje od 37% ukupnog spektra U praksi = 112 bitni ključ
  • 21. Analiza korisničkih lozinki: e ainsrtoludmckgphvbfyzjw 'qxSA&quot;CETMNBP`ILRDG /HFKOWUVJZ^X.YQ&+,48!()1{:?03#9567=%$@|*;_<}][>~ perica22 perica22! (a0, a0! …)
  • 22. Učinkovitost kriptoanaliti čkih napada: Napadi na algoritam: Kriptoanalitički napad = 2^64 -> 2^63 2^64/2^63 = 2 AES192 - > Kompleksnost napada 2^192 -> CPT napad 2^176 -> 65536x jednostavnije -> 100k god. / 65536 = 1.5god.
  • 23.
  • 24.
  • 25.