SlideShare a Scribd company logo
1 of 45
Download to read offline
Outline Background Past Present Future
TLS: Past, Present, Future
Thyla van der Merwe
Royal Holloway, University of London
2 May 2016
TLS: Past, Present, Future – Thyla van der Merwe 1/ 30
Outline Background Past Present Future
Outline
2011$ 2016$
1 Background (what is TLS?)
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Outline
2011$ 2016$
1 Background (what is TLS?)
2 The Past
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Outline
2011$ 2016$
1 Background (what is TLS?)
2 The Past
3 The Present
Password recovery attacks against RC4 in TLS
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Outline
2011$ 2016$
1 Background (what is TLS?)
2 The Past
3 The Present
Password recovery attacks against RC4 in TLS
4 The Future
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Outline
2011$ 2016$
1 Background (what is TLS?)
2 The Past
3 The Present
Password recovery attacks against RC4 in TLS
4 The Future
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Outline
2011$ 2015$
PAST$ PRESENT$ FUTURE$
2011$ 2016$
1 Background (what is TLS?)
2 The Past
3 The Present
Password recovery attacks against RC4 in TLS
4 The Future
TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
Outline Background Past Present Future
Importance of TLS [KP]
Originally designed for secure e-commerce, now widely used
Access to online banking
Acesss to Gmail, Facebook, etc.
Mobile applications, including banking apps
TLS has become the de facto secure protocol of choice
Used by millions (billions?) of devices daily
Analysis is crucial
TLS: Past, Present, Future – Thyla van der Merwe 3/ 30
Outline Background Past Present Future
Highly Simplified View of TLS
Ku,$Kd$
Data$Link$
Internet$
Transport$
Applica7on$ TLS$h:p$
tcp$
hello, let’s chat
okay, let’s agree on algorithms,
establish keys to communicate
securely and here’s some assurance
as to my identity
Ku,$Kd$
let’s exchange application data
Handshake$protocol$
Record$protocol$
C S
Nego7ate$ciphersuite,$
authen7cate$en77es$and$establish$
keys$for$record$protocol$
Provide$confiden7ality$and$authen7city$of$applica7on$data$using$keys$
established$in$the$Handshake$protocol$
TLS: Past, Present, Future – Thyla van der Merwe 4/ 30
Outline Background Past Present Future
The TLS Ecosystem
TLS	
  versions	
  
TLS	
  extensions	
  
DTLS	
  
TLS	
  Ecosystem	
  
Servers	
   Clients	
  
Cer1fica1on	
  
Authori1es	
  (CAs)	
  
So:ware	
  vendors	
  
Hardware	
  vendors	
  
Researchers	
  
Standards	
  
TLS: Past, Present, Future – Thyla van der Merwe 5/ 30
Outline Background Past Present Future
Past
Started life as SSL, developed by Netscape
SSL 2.0 released in 1995 and SSL 3.0 in 1996
TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in
2008
Bleichenbacher Attack in 1998, against RSA using PKCS#1
Renegotiation Attack by Ray and Dispensa in 2009,
impersonation attack
TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
Outline Background Past Present Future
Past
2011$
1995$
1996$
1999$
2006$
2008$ 2016$
2009$
1998$
Started life as SSL, developed by Netscape
SSL 2.0 released in 1995 and SSL 3.0 in 1996
TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in
2008
Bleichenbacher Attack in 1998, against RSA using PKCS#1
Renegotiation Attack by Ray and Dispensa in 2009,
impersonation attack
TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
Outline Background Past Present Future
Past
2011$
1995$
1996$
1999$
2006$
2008$ 2016$
2009$
1998$
2002$
Started life as SSL, developed by Netscape
SSL 2.0 released in 1995 and SSL 3.0 in 1996
TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in
2008
Bleichenbacher Attack in 1998, against RSA using PKCS#1
Renegotiation Attack by Ray and Dispensa in 2009,
impersonation attack
TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
Outline Background Past Present Future
As of 21 April, 2016. Available at:
https://www.trustworthyinternet.org/ssl-pulse/
TLS: Past, Present, Future – Thyla van der Merwe 7/ 30
Outline Background Past Present Future
Present
BEAST by Duong and Rizzo in 2011
CRIME by Duong and Rizzo in 2012
Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks
by Al Fardan et al. in 2013
Cookie Cutter and Triple Handshake attacks by Bhargavan et
al., Heartbleed bug and POODLE by Moller et al. in 2014
TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
Outline Background Past Present Future
Present
2011$
1995$
1996$
1999$
2006$
2008$
2016$2009$
2012$
2013$
2014$
1998$
2002$
2015$
BEAST by Duong and Rizzo in 2011
CRIME by Duong and Rizzo in 2012
Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks
by Al Fardan et al. in 2013
Cookie Cutter and Triple Handshake attacks by Bhargavan et
al., Heartbleed bug and POODLE by Moller et al. in 2014
TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
Outline Background Past Present Future
Present
2011$
1995$
1996$
1999$
2006$
2008$
2016$2009$
2012$
2013$
2014$
1998$
2002$
2015$
BEAST by Duong and Rizzo in 2011
CRIME by Duong and Rizzo in 2012
Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks
by Al Fardan et al. in 2013
Cookie Cutter and Triple Handshake attacks by Bhargavan et
al., Heartbleed bug and POODLE by Moller et al. in 2014
TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Password Recovery Attacks Against RC4 in TLS [GPV15]
Despite work such as On the Security of RC4 in TLS, Al
Fardan et al. (USENIX 2013) RC4 usage stood at 35% of
TLS connections
ICSI$Notary$Sta+s+cs$[Dec.,$2014]$
h9p://notary.icsi.berkeley.edu/$
TLS: Past, Present, Future – Thyla van der Merwe 9/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Password Recovery Attacks Against RC4 in TLS [GPV15]
Despite work such as On the Security of RC4 in TLS, Al
Fardan et al. (USENIX 2013) RC4 usage stood at 35% of
TLS connections
Can we strengthen these attacks?
Passwords are widely used for authentication and the fact that
they are not uniformly distributed may give us a boost
Get RC4 closer to the point where it needs to be abandoned!
TLS: Past, Present, Future – Thyla van der Merwe 9/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
RC4
RC4 State
Byte permutation and indices i and j
RC4 Key scheduling
 RC4 Keystream generation
TLS: Past, Present, Future – Thyla van der Merwe 10/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
RC4 in TLS
Ku,	
  Kd	
  
Data	
  Link	
  
Internet	
  
Transport	
  
Applica7on	
   TLS	
  h:p	
  
tcp	
  
ClientHello(…,[RC4,…])
ServerHello(…,RC4)
.	
  
.	
  
.	
  
ClientFinshed
.	
  
Ku,	
  Kd	
  
ServerFinshed
applica7on	
  data	
  
.	
  
.	
  
.	
  
Handshake	
  protocol	
  
Record	
  protocol	
  
(encrypted	
  with	
  RC4,	
  
keys	
  Ku	
  and	
  Kd)	
  
Integrity,	
  HMAC-­‐SHA1	
  
Cr	
  =	
  Pr	
  	
  	
  	
  	
  	
  	
  Zr	
  
C S
	
  
36	
  protected	
  FINISHED	
  bytes	
  
	
  
	
  
TLS: Past, Present, Future – Thyla van der Merwe 11/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
RC4 Biases
0
32
64
96
128
160
192
224
255
0 32 64 96 128 160 192 224 255
Bytevalue,Position2[0...255]
Byte value, Position 1 [0...255]
INFILE using 1:2:(max(min(4194304*$3,1.0),-1.0))
-1
-0.5
0
0.5
1
TLS: Past, Present, Future – Thyla van der Merwe 12/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Attack Setting
First described by Mantin and Shamir in 2001
A fixed plaintext, P, is encrypted multiple times under
independent RC4 keys, Ki
P,#K1#
P,#KS#
TLS: Past, Present, Future – Thyla van der Merwe 13/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Plaintext Recovery via Bayesian Analysis
We want to maximize (for a position in the plaintext stream r):
Pr(X = x | C = c)
X is the random variable corresponding to a plaintext byte, x
C is the random variable corresponding to a vector of ciphertext
bytes
TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Plaintext Recovery via Bayesian Analysis
Using Bayes’ Theorem:
Pr(X = x | C = c) =
Pr(C = c | X = x) · Pr(X = x)
Pr(C = c)
=
Pr(C = c | X = x) · Pr(X = x)
x ∈X Pr(C = c | X = x ) · Pr(X = x )
TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Plaintext Recovery via Bayesian Analysis
So we actually want to maximize this:
Pr(C = c | X = x) · Pr(X = x)
However,
Pr(C = c | X = x) = Pr(Z = z)
and it suffices to maximize:
Pr(X = x) · Pr(Z = z)
TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Plaintext Recovery via Bayesian Analysis
a"posteriori"likelihood(of(x(being((
correct(byte(
Recovery(algorithm:((
Compute(most(likely(byte(by((
considering(all(byte(possibili7es(
(
C1(
C2(
C3(
CS(
...((
r""
encryp7ons(of(fixed(byte((
under(different(keys(
byte(candidate((
(x("
x"
...((
yields(induced(distribu7on(on(
keystream(bytes(Zr"
combine(with(known(distribu7on(
Combine(with(a"priori"plaintext(
distribu7on((
x"
x"
x"
TLS: Past, Present, Future – Thyla van der Merwe 15/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Attacking Cookies [ABPPS13]
a"posteriori"likelihood(of(x(being((
correct(byte(
Recovery(algorithm:((
Compute(most(likely(byte(by((
considering(all(byte(possibili7es(
(
Repeat(for(all(bytes(of(the(cookie(
C1(
C2(
C3(
CS(
...((
r""
encryp7ons(of(fixed(byte((
under(different(keys(
byte(candidate((
(x("
x"
...((
yields(induced(distribu7on(on(
keystream(bytes(Zr"
combine(with(known(distribu7on(
assume(a"priori"plaintext(
distribu7on(uniform(
x"
x"
x"
✗((256(posi7ons,(234(encryp7ons,(2000(hrs!(
TLS: Past, Present, Future – Thyla van der Merwe 16/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Attacking Passwords
Widely used for authentication on the web, NOT uniformly
distributed
RockYou leak of 32 million passwords in 2009, about 14
million unique, 123456 most popular
Have a priori information from leaked datasets
Multiple bytes, not just one...
TLS: Past, Present, Future – Thyla van der Merwe 17/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Attacking Passwords
For n bytes we want to maximize
Pr(X = x) · Pr(Z = z)
where X is the random variable corresponding to a vector of
plaintext bytes, x = (x0, x1, . . . , xn−1)
Z is the random variable corresponding to the matrix of keystream
bytes
?? Pr(Z = z)??
TLS: Past, Present, Future – Thyla van der Merwe 18/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Attacking Passwords
For n bytes we want to maximize
Pr(X = x) · Pr(Z = z)
where X is the random variable corresponding to a vector of
plaintext bytes, x = (x0, x1, . . . , xn−1)
Z is the random variable corresponding to the matrix of keystream
bytes
?? Pr(Z = z)??
TLS: Past, Present, Future – Thyla van der Merwe 18/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Approximations
Pr(Z%=%z)%%
A"ack&1:&&
Assume&keystream&bytes&behave&
independently&–&use&single6byte&probabili8es&
(product&distribu8on)&
A"ack&2:&&
Assume&keystream&byte&is&influenced&only&by&
byte&directly&adjacent&to&it&–&use&double6&and&
single6byte&probabili8es&
TLS: Past, Present, Future – Thyla van der Merwe 19/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Approximations
a"posteriori"likelihood(of(x(being((
correct(password(
!Recovery!algorithm:!(
(Compute(most(likely(password(from((((
(dic8onary(of(N(passwords(
C1(
C2(
C3(
CS(
...((
r,"r+1,…,"r+n11"
encryp8ons(of(fixed(password((
under(different(keys(
password(candidate((
(x(=(x0",x1",…,"xn"
x0,"x1,"…,"xn"
...((
x0,"x1,"…,"xn"
x0,"x1,"…,"xn"
x0,"x1,"…,"xn"
yields(induced(distribu8on(on(
keystream(bytes(Zr,Zr+1,…,Zr+n11""
combine(with(known(distribu8on(
approximate!using!known!!
distribu:on!
combine(with(a"priori"password(
distribu8on(
TLS: Past, Present, Future – Thyla van der Merwe 20/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
What’s different?
n bytes instead of one
T attempts before lockout
dictionary of size N
single-byte vs double-byte estimator
Base64 or ASCII
r starting position
S ciphertexts
guessing attacks
TLS: Past, Present, Future – Thyla van der Merwe 21/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Simulation Results
Use a dictionary built from RockYou leak dataset to attack
Singles.org dataset
More realistic but limits our success rate
Default parameters, n = 6, T = 5, S = 220, 222, . . . , 228
Success rate based on 256 experiments
TLS: Past, Present, Future – Thyla van der Merwe 22/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Simulation Results
Single-byte vs double-byte, n = 6, T = 5
0
0.2
0.4
0.6
0.8
1
0 64 128 192 256
SuccessRate
Starting Position
db, 220
db, 222
db, 224
db, 226
db, 228
sb, 220
sb, 222
sb, 224
sb, 226
sb, 228
TLS: Past, Present, Future – Thyla van der Merwe 23/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Simulation Results
T vs success rate, n = 6, r = 133 - double-byte and guessing
0
5
10
15
20
25
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
log2(T)
Recovery Rate
214
216
218
220
222
224
226
228
optimal guessing
TLS: Past, Present, Future – Thyla van der Merwe 24/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Practical Validation
Applicable to BasicAuth and IMAP
We need multiple, independent encryptions of the password
We need the password to be encrypted at a favourable
position
TLS: Past, Present, Future – Thyla van der Merwe 25/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Practical Validation
www.evil.com!
www.good.com!
PW = 123456!
PW!
TLS
channel!
r = 133!
Resumption latency of 250ms, 226, 6 parallel connections, 776
hours (at 100ms, 312 hours)
TLS: Past, Present, Future – Thyla van der Merwe 26/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
ICSI$Notary$Sta+s+cs$[Jul./Aug.,$2015]$
h=p://notary.icsi.berkeley.edu/$
RC4$at$12.8$%$$
ICSI$Notary$Sta+s+cs$[Mar./Apr.,$2016]$
RC4$at$2.4$%$$
TLS: Past, Present, Future – Thyla van der Merwe 27/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Present
Password Recovery Attacks Against RC4 in TLS by Garman et
al. (OUR WORK)
FREAK by Beurdouche et al., Bar Mitzva Attack by Mantin,
LOGJAM, RC4 attack by Vanhoef and Piessens
Attack by Jager et. al, SLOTH and DROWN
TLS: Past, Present, Future – Thyla van der Merwe 28/ 30
Outline Background Past Present Future
Password Recovery Attacks Against RC4 in TLS
Present
2011$ 2015$
1995$
1996$
1999$
2006$
2008$
2016$
$$10$
2009$
2012$
2013$
2014$
1998$
2002$
Password Recovery Attacks Against RC4 in TLS by Garman et
al. (OUR WORK)
FREAK by Beurdouche et al., Bar Mitzva Attack by Mantin,
LOGJAM, RC4 attack by Vanhoef and Piessens
Attack by Jager et. al, SLOTH and DROWN
TLS: Past, Present, Future – Thyla van der Merwe 28/ 30
Outline Background Past Present Future
Future
2011$ 2015$
1995$
1996$
1999$
2006$
2008$
2016$
$$10$
2009$
2012$
2013$
2014$
1998$
2002$
See my next talk :-)
Draft 1 of TLS 1.3 released in March 2015, draft 12 released
in March 2016
Encrypt as much of the handshake as possible
Re-evaluate the handshake contents - different handshakes,
renegotiation handshake removed, resumption done differently
1-RTT for initial handshake, 0-RTT for repeated handshakes,
also 0.5-RTT
Update the record protection mechanisms
TLS: Past, Present, Future – Thyla van der Merwe 29/ 30
Outline Background Past Present Future
Future
2011$ 2015$
1995$
1996$
1999$
2006$
2008$
2016$
$$10$
2009$
2012$
2013$
2014$
1998$
2002$
See my next talk :-)
Draft 1 of TLS 1.3 released in March 2015, draft 12 released
in March 2016
Encrypt as much of the handshake as possible
Re-evaluate the handshake contents - different handshakes,
renegotiation handshake removed, resumption done differently
1-RTT for initial handshake, 0-RTT for repeated handshakes,
also 0.5-RTT
Update the record protection mechanisms
TLS: Past, Present, Future – Thyla van der Merwe 29/ 30
Outline Background Past Present Future
Takeaways
2011$ 2015$ 2016$
2009$
2012$
2013$
2014$
1998$
2002$
TLS: Past, Present, Future – Thyla van der Merwe 30/ 30

More Related Content

What's hot

Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUICNatasha Rooney
 
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...wallyqs
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSAChris Theisen
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsSarthak Patel
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic CryptographyUniversitas Pembangunan Panca Budi
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and RiskSukbum Hong
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMACKrishna Gehlot
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication CodesDarshanPatil82
 

What's hot (18)

6.hash mac
6.hash mac6.hash mac
6.hash mac
 
Hash
HashHash
Hash
 
Evolving HTTP and making things QUIC
Evolving HTTP and making things QUICEvolving HTTP and making things QUIC
Evolving HTTP and making things QUIC
 
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...GopherCon 2017 -  Writing Networking Clients in Go: The Design & Implementati...
GopherCon 2017 - Writing Networking Clients in Go: The Design & Implementati...
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 
Public Key Cryptosystems and RSA
Public Key Cryptosystems and RSAPublic Key Cryptosystems and RSA
Public Key Cryptosystems and RSA
 
SSL Demystified
SSL DemystifiedSSL Demystified
SSL Demystified
 
The Double Ratchet Algorithm
The Double Ratchet AlgorithmThe Double Ratchet Algorithm
The Double Ratchet Algorithm
 
Message Authentication: MAC, Hashes
Message Authentication: MAC, HashesMessage Authentication: MAC, Hashes
Message Authentication: MAC, Hashes
 
Is unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functionsIs unit 5_message authentication and hash functions
Is unit 5_message authentication and hash functions
 
Network Security Lec5
Network Security  Lec5Network Security  Lec5
Network Security Lec5
 
Ch11
Ch11Ch11
Ch11
 
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher  in Classic CryptographyThree-Pass Protocol Implementation on Caesar Cipher  in Classic Cryptography
Three-Pass Protocol Implementation on Caesar Cipher in Classic Cryptography
 
DNS DDoS Attack and Risk
DNS DDoS Attack and RiskDNS DDoS Attack and Risk
DNS DDoS Attack and Risk
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Lecture 2 Message Authentication
Lecture 2   Message AuthenticationLecture 2   Message Authentication
Lecture 2 Message Authentication
 
Message Authentication Code & HMAC
Message Authentication Code & HMACMessage Authentication Code & HMAC
Message Authentication Code & HMAC
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 

Viewers also liked

Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01
Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01
Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01Kashyap Kankotiya
 
CE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatoryCE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatorySoe Hein Kyaw
 
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...Scality
 
Construction Design and Management Regulations (CDM) 2015
Construction Design and Management Regulations (CDM) 2015Construction Design and Management Regulations (CDM) 2015
Construction Design and Management Regulations (CDM) 2015THSPRiskManagement
 
акцентуации характера
акцентуации характераакцентуации характера
акцентуации характераVlad Kondratenko
 
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...Packaging Technology and Research, LLC
 
JnJ Insight Report_2016 Digital Media Summary_2017.01
JnJ Insight Report_2016 Digital Media Summary_2017.01JnJ Insight Report_2016 Digital Media Summary_2017.01
JnJ Insight Report_2016 Digital Media Summary_2017.01JnJinteractive
 
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...Dra. Yokasta Germosén Almonte
 
Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setFaizan Khan
 
Global Food Security: What Role for Trade Policies?
Global Food Security: What Role for Trade Policies?Global Food Security: What Role for Trade Policies?
Global Food Security: What Role for Trade Policies?Waite Research Institute
 
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...gerenciaproy
 
Anemia in pregnancy
Anemia in pregnancyAnemia in pregnancy
Anemia in pregnancyAlly Seif
 

Viewers also liked (20)

27916-Lead Auditor Qualita
27916-Lead Auditor Qualita27916-Lead Auditor Qualita
27916-Lead Auditor Qualita
 
Histoire de charolles
Histoire de charollesHistoire de charolles
Histoire de charolles
 
Diapo final
Diapo finalDiapo final
Diapo final
 
Exp. Weguad
Exp. WeguadExp. Weguad
Exp. Weguad
 
Sect r32
Sect r32Sect r32
Sect r32
 
Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01
Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01
Contributortopersonalitydevelopmentpptsuneel 110210106004-conversion-gate01
 
Qualifications
QualificationsQualifications
Qualifications
 
CE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatoryCE Marking- EMC- Products Regulatory
CE Marking- EMC- Products Regulatory
 
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...
S3 Server Hackathon Presented by S3 Server, a Scality Product, Seagate and Ho...
 
Construction Design and Management Regulations (CDM) 2015
Construction Design and Management Regulations (CDM) 2015Construction Design and Management Regulations (CDM) 2015
Construction Design and Management Regulations (CDM) 2015
 
акцентуации характера
акцентуации характераакцентуации характера
акцентуации характера
 
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...
2015- GFSI, BRC, SQF and beyond where food safety is heading and packaging’s ...
 
JnJ Insight Report_2016 Digital Media Summary_2017.01
JnJ Insight Report_2016 Digital Media Summary_2017.01JnJ Insight Report_2016 Digital Media Summary_2017.01
JnJ Insight Report_2016 Digital Media Summary_2017.01
 
haccp of pineapple canned in syrup
haccp of pineapple canned in syruphaccp of pineapple canned in syrup
haccp of pineapple canned in syrup
 
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...
MEDICINA FAMILIAR Y COMUNITARIA EN LA ZONA SUR: UN ANTES Y UN DESPUÉS.: Cons...
 
Nebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this setNebosh igc1 63 cards in this set
Nebosh igc1 63 cards in this set
 
Global Food Security: What Role for Trade Policies?
Global Food Security: What Role for Trade Policies?Global Food Security: What Role for Trade Policies?
Global Food Security: What Role for Trade Policies?
 
Charlas Para Pacientes: MENOPAUSIA
Charlas Para Pacientes: MENOPAUSIACharlas Para Pacientes: MENOPAUSIA
Charlas Para Pacientes: MENOPAUSIA
 
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...
Propuesta para reformular el enfoque y el modelo pedagógico del colegio casti...
 
Anemia in pregnancy
Anemia in pregnancyAnemia in pregnancy
Anemia in pregnancy
 

Similar to TLS: Past, Present, Future

Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Aaron Zauner
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS SecurityAaron Zauner
 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkNisheed KM
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...Amazon Web Services
 
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...vanhoefm
 
Study and Analysis of some Known attacks on Transport Layer Security
Study and Analysis of some Known attacks on Transport Layer SecurityStudy and Analysis of some Known attacks on Transport Layer Security
Study and Analysis of some Known attacks on Transport Layer SecurityNazmul Hossain Rakib
 
Hacking SSL When Using RC4
Hacking SSL When Using RC4Hacking SSL When Using RC4
Hacking SSL When Using RC4Khairi Aiman
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief Historyprasenjeetd
 
SSL/TLS Eavesdropping with Fullpath Control
SSL/TLS Eavesdropping with Fullpath ControlSSL/TLS Eavesdropping with Fullpath Control
SSL/TLS Eavesdropping with Fullpath ControlMike Thompson
 
True or False Statement The DNS namespace is hierarchical. Protocols.pdf
True or False Statement The DNS namespace is hierarchical. Protocols.pdfTrue or False Statement The DNS namespace is hierarchical. Protocols.pdf
True or False Statement The DNS namespace is hierarchical. Protocols.pdffazilfootsteps
 
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...Tharindu Weerasinghe
 
Evaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and ImplementationsEvaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and ImplementationsJustin Ehrenhofer
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applicationsRajesh Ishida
 
Compression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN NetworksCompression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN NetworksPriyanka Aash
 
How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?Microsoft
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack onijcsa
 

Similar to TLS: Past, Present, Future (20)

Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)Introduction to and survey of TLS security (BsidesHH 2014)
Introduction to and survey of TLS security (BsidesHH 2014)
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
Introduction to and survey of TLS Security
Introduction to and survey of TLS SecurityIntroduction to and survey of TLS Security
Introduction to and survey of TLS Security
 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security Talk
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
USENIX Security '15: All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP a...
 
Study and Analysis of some Known attacks on Transport Layer Security
Study and Analysis of some Known attacks on Transport Layer SecurityStudy and Analysis of some Known attacks on Transport Layer Security
Study and Analysis of some Known attacks on Transport Layer Security
 
Hacking SSL When Using RC4
Hacking SSL When Using RC4Hacking SSL When Using RC4
Hacking SSL When Using RC4
 
Network Security
Network SecurityNetwork Security
Network Security
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
SSL/TLS Eavesdropping with Fullpath Control
SSL/TLS Eavesdropping with Fullpath ControlSSL/TLS Eavesdropping with Fullpath Control
SSL/TLS Eavesdropping with Fullpath Control
 
True or False Statement The DNS namespace is hierarchical. Protocols.pdf
True or False Statement The DNS namespace is hierarchical. Protocols.pdfTrue or False Statement The DNS namespace is hierarchical. Protocols.pdf
True or False Statement The DNS namespace is hierarchical. Protocols.pdf
 
HTTPS, Here and Now
HTTPS, Here and NowHTTPS, Here and Now
HTTPS, Here and Now
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
Usage of rc4 cipher in SSL configurations of Sri Lankan financial institutes ...
 
Evaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and ImplementationsEvaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and Implementations
 
A study of cryptography for satellite applications
A study of cryptography for satellite applicationsA study of cryptography for satellite applications
A study of cryptography for satellite applications
 
Compression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN NetworksCompression Oracle Attacks on VPN Networks
Compression Oracle Attacks on VPN Networks
 
How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?
 
Quantifying the impact of flood attack on
Quantifying the impact of flood attack onQuantifying the impact of flood attack on
Quantifying the impact of flood attack on
 

More from vpnmentor

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter vpnmentor
 
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung HanHomomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Hanvpnmentor
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routingvpnmentor
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwarivpnmentor
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwarivpnmentor
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...vpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrenciesvpnmentor
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part IIvpnmentor
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacksvpnmentor
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part Ivpnmentor
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies vpnmentor
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Modelvpnmentor
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryptionvpnmentor
 

More from vpnmentor (13)

On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter On the Bit Security of Cryptographic Primitives. by Michael Walter
On the Bit Security of Cryptographic Primitives. by Michael Walter
 
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung HanHomomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
Homomorphic Lower Digit Removal and Improved FHE Bootstrapping by Kyoohyung Han
 
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet RoutingMichael schapira - Hebrew University Jeruslaem - Secure Internet Routing
Michael schapira - Hebrew University Jeruslaem - Secure Internet Routing
 
Review of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak MaheshwariReview of Previous ETAP Forums - Deepak Maheshwari
Review of Previous ETAP Forums - Deepak Maheshwari
 
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak MaheshwariIndia’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
India’s National Biometrics ID - Presented by Mr. Deepak Maheshwari
 
A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...A research-oriented introduction to the cryptographic currencies (starting wi...
A research-oriented introduction to the cryptographic currencies (starting wi...
 
Alternative cryptocurrencies
Alternative cryptocurrenciesAlternative cryptocurrencies
Alternative cryptocurrencies
 
Smart contracts and applications part II
Smart contracts and applications   part IISmart contracts and applications   part II
Smart contracts and applications part II
 
Mining pools and attacks
Mining pools and attacksMining pools and attacks
Mining pools and attacks
 
Smart contracts and applications part I
Smart contracts and applications   part ISmart contracts and applications   part I
Smart contracts and applications part I
 
Alternative cryptocurrencies
Alternative cryptocurrencies Alternative cryptocurrencies
Alternative cryptocurrencies
 
On the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard ModelOn the Security of TLS-DHE in the Standard Model
On the Security of TLS-DHE in the Standard Model
 
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 EncryptionOn the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption
 

Recently uploaded

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查ydyuyu
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理F
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Roommeghakumariji156
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...MOHANI PANDEY
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoilmeghakumariji156
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...Sareena Khatun
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxi191686
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理AS
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxjeykeydeveloper
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...Sareena Khatun
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 

Recently uploaded (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理一比一原版帝国理工学院毕业证如何办理
一比一原版帝国理工学院毕业证如何办理
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
Call girls Service Canacona - 8250092165 Our call girls are sure to provide y...
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...💚 Call Girls Bahraich   9332606886  High Profile Call Girls You Can Get The S...
💚 Call Girls Bahraich 9332606886 High Profile Call Girls You Can Get The S...
 
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptxResearch Assignment - NIST SP800 [172 A] - Presentation.pptx
Research Assignment - NIST SP800 [172 A] - Presentation.pptx
 
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
一比一原版(Dundee毕业证书)英国爱丁堡龙比亚大学毕业证如何办理
 
PIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsxPIC Microcontroller Structure & Assembly Language.ppsx
PIC Microcontroller Structure & Assembly Language.ppsx
 
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...Local Call Girls in Gomati  9332606886 HOT & SEXY Models beautiful and charmi...
Local Call Girls in Gomati 9332606886 HOT & SEXY Models beautiful and charmi...
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

TLS: Past, Present, Future

  • 1. Outline Background Past Present Future TLS: Past, Present, Future Thyla van der Merwe Royal Holloway, University of London 2 May 2016 TLS: Past, Present, Future – Thyla van der Merwe 1/ 30
  • 2. Outline Background Past Present Future Outline 2011$ 2016$ 1 Background (what is TLS?) TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 3. Outline Background Past Present Future Outline 2011$ 2016$ 1 Background (what is TLS?) 2 The Past TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 4. Outline Background Past Present Future Outline 2011$ 2016$ 1 Background (what is TLS?) 2 The Past 3 The Present Password recovery attacks against RC4 in TLS TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 5. Outline Background Past Present Future Outline 2011$ 2016$ 1 Background (what is TLS?) 2 The Past 3 The Present Password recovery attacks against RC4 in TLS 4 The Future TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 6. Outline Background Past Present Future Outline 2011$ 2016$ 1 Background (what is TLS?) 2 The Past 3 The Present Password recovery attacks against RC4 in TLS 4 The Future TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 7. Outline Background Past Present Future Outline 2011$ 2015$ PAST$ PRESENT$ FUTURE$ 2011$ 2016$ 1 Background (what is TLS?) 2 The Past 3 The Present Password recovery attacks against RC4 in TLS 4 The Future TLS: Past, Present, Future – Thyla van der Merwe 2/ 30
  • 8. Outline Background Past Present Future Importance of TLS [KP] Originally designed for secure e-commerce, now widely used Access to online banking Acesss to Gmail, Facebook, etc. Mobile applications, including banking apps TLS has become the de facto secure protocol of choice Used by millions (billions?) of devices daily Analysis is crucial TLS: Past, Present, Future – Thyla van der Merwe 3/ 30
  • 9. Outline Background Past Present Future Highly Simplified View of TLS Ku,$Kd$ Data$Link$ Internet$ Transport$ Applica7on$ TLS$h:p$ tcp$ hello, let’s chat okay, let’s agree on algorithms, establish keys to communicate securely and here’s some assurance as to my identity Ku,$Kd$ let’s exchange application data Handshake$protocol$ Record$protocol$ C S Nego7ate$ciphersuite,$ authen7cate$en77es$and$establish$ keys$for$record$protocol$ Provide$confiden7ality$and$authen7city$of$applica7on$data$using$keys$ established$in$the$Handshake$protocol$ TLS: Past, Present, Future – Thyla van der Merwe 4/ 30
  • 10. Outline Background Past Present Future The TLS Ecosystem TLS  versions   TLS  extensions   DTLS   TLS  Ecosystem   Servers   Clients   Cer1fica1on   Authori1es  (CAs)   So:ware  vendors   Hardware  vendors   Researchers   Standards   TLS: Past, Present, Future – Thyla van der Merwe 5/ 30
  • 11. Outline Background Past Present Future Past Started life as SSL, developed by Netscape SSL 2.0 released in 1995 and SSL 3.0 in 1996 TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in 2008 Bleichenbacher Attack in 1998, against RSA using PKCS#1 Renegotiation Attack by Ray and Dispensa in 2009, impersonation attack TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
  • 12. Outline Background Past Present Future Past 2011$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$ 2009$ 1998$ Started life as SSL, developed by Netscape SSL 2.0 released in 1995 and SSL 3.0 in 1996 TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in 2008 Bleichenbacher Attack in 1998, against RSA using PKCS#1 Renegotiation Attack by Ray and Dispensa in 2009, impersonation attack TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
  • 13. Outline Background Past Present Future Past 2011$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$ 2009$ 1998$ 2002$ Started life as SSL, developed by Netscape SSL 2.0 released in 1995 and SSL 3.0 in 1996 TLS 1.0 released in 1999, TLS 1.1 in 2006 and TLS 1.2 in 2008 Bleichenbacher Attack in 1998, against RSA using PKCS#1 Renegotiation Attack by Ray and Dispensa in 2009, impersonation attack TLS: Past, Present, Future – Thyla van der Merwe 6/ 30
  • 14. Outline Background Past Present Future As of 21 April, 2016. Available at: https://www.trustworthyinternet.org/ssl-pulse/ TLS: Past, Present, Future – Thyla van der Merwe 7/ 30
  • 15. Outline Background Past Present Future Present BEAST by Duong and Rizzo in 2011 CRIME by Duong and Rizzo in 2012 Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks by Al Fardan et al. in 2013 Cookie Cutter and Triple Handshake attacks by Bhargavan et al., Heartbleed bug and POODLE by Moller et al. in 2014 TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
  • 16. Outline Background Past Present Future Present 2011$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$2009$ 2012$ 2013$ 2014$ 1998$ 2002$ 2015$ BEAST by Duong and Rizzo in 2011 CRIME by Duong and Rizzo in 2012 Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks by Al Fardan et al. in 2013 Cookie Cutter and Triple Handshake attacks by Bhargavan et al., Heartbleed bug and POODLE by Moller et al. in 2014 TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
  • 17. Outline Background Past Present Future Present 2011$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$2009$ 2012$ 2013$ 2014$ 1998$ 2002$ 2015$ BEAST by Duong and Rizzo in 2011 CRIME by Duong and Rizzo in 2012 Lucky Thirteen by Al Fardan and Paterson, and RC4 Attacks by Al Fardan et al. in 2013 Cookie Cutter and Triple Handshake attacks by Bhargavan et al., Heartbleed bug and POODLE by Moller et al. in 2014 TLS: Past, Present, Future – Thyla van der Merwe 8/ 30
  • 18. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Password Recovery Attacks Against RC4 in TLS [GPV15] Despite work such as On the Security of RC4 in TLS, Al Fardan et al. (USENIX 2013) RC4 usage stood at 35% of TLS connections ICSI$Notary$Sta+s+cs$[Dec.,$2014]$ h9p://notary.icsi.berkeley.edu/$ TLS: Past, Present, Future – Thyla van der Merwe 9/ 30
  • 19. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Password Recovery Attacks Against RC4 in TLS [GPV15] Despite work such as On the Security of RC4 in TLS, Al Fardan et al. (USENIX 2013) RC4 usage stood at 35% of TLS connections Can we strengthen these attacks? Passwords are widely used for authentication and the fact that they are not uniformly distributed may give us a boost Get RC4 closer to the point where it needs to be abandoned! TLS: Past, Present, Future – Thyla van der Merwe 9/ 30
  • 20. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS RC4 RC4 State Byte permutation and indices i and j RC4 Key scheduling RC4 Keystream generation TLS: Past, Present, Future – Thyla van der Merwe 10/ 30
  • 21. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS RC4 in TLS Ku,  Kd   Data  Link   Internet   Transport   Applica7on   TLS  h:p   tcp   ClientHello(…,[RC4,…]) ServerHello(…,RC4) .   .   .   ClientFinshed .   Ku,  Kd   ServerFinshed applica7on  data   .   .   .   Handshake  protocol   Record  protocol   (encrypted  with  RC4,   keys  Ku  and  Kd)   Integrity,  HMAC-­‐SHA1   Cr  =  Pr              Zr   C S   36  protected  FINISHED  bytes       TLS: Past, Present, Future – Thyla van der Merwe 11/ 30
  • 22. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS RC4 Biases 0 32 64 96 128 160 192 224 255 0 32 64 96 128 160 192 224 255 Bytevalue,Position2[0...255] Byte value, Position 1 [0...255] INFILE using 1:2:(max(min(4194304*$3,1.0),-1.0)) -1 -0.5 0 0.5 1 TLS: Past, Present, Future – Thyla van der Merwe 12/ 30
  • 23. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Attack Setting First described by Mantin and Shamir in 2001 A fixed plaintext, P, is encrypted multiple times under independent RC4 keys, Ki P,#K1# P,#KS# TLS: Past, Present, Future – Thyla van der Merwe 13/ 30
  • 24. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Plaintext Recovery via Bayesian Analysis We want to maximize (for a position in the plaintext stream r): Pr(X = x | C = c) X is the random variable corresponding to a plaintext byte, x C is the random variable corresponding to a vector of ciphertext bytes TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
  • 25. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Plaintext Recovery via Bayesian Analysis Using Bayes’ Theorem: Pr(X = x | C = c) = Pr(C = c | X = x) · Pr(X = x) Pr(C = c) = Pr(C = c | X = x) · Pr(X = x) x ∈X Pr(C = c | X = x ) · Pr(X = x ) TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
  • 26. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Plaintext Recovery via Bayesian Analysis So we actually want to maximize this: Pr(C = c | X = x) · Pr(X = x) However, Pr(C = c | X = x) = Pr(Z = z) and it suffices to maximize: Pr(X = x) · Pr(Z = z) TLS: Past, Present, Future – Thyla van der Merwe 14/ 30
  • 27. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Plaintext Recovery via Bayesian Analysis a"posteriori"likelihood(of(x(being(( correct(byte( Recovery(algorithm:(( Compute(most(likely(byte(by(( considering(all(byte(possibili7es( ( C1( C2( C3( CS( ...(( r"" encryp7ons(of(fixed(byte(( under(different(keys( byte(candidate(( (x(" x" ...(( yields(induced(distribu7on(on( keystream(bytes(Zr" combine(with(known(distribu7on( Combine(with(a"priori"plaintext( distribu7on(( x" x" x" TLS: Past, Present, Future – Thyla van der Merwe 15/ 30
  • 28. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Attacking Cookies [ABPPS13] a"posteriori"likelihood(of(x(being(( correct(byte( Recovery(algorithm:(( Compute(most(likely(byte(by(( considering(all(byte(possibili7es( ( Repeat(for(all(bytes(of(the(cookie( C1( C2( C3( CS( ...(( r"" encryp7ons(of(fixed(byte(( under(different(keys( byte(candidate(( (x(" x" ...(( yields(induced(distribu7on(on( keystream(bytes(Zr" combine(with(known(distribu7on( assume(a"priori"plaintext( distribu7on(uniform( x" x" x" ✗((256(posi7ons,(234(encryp7ons,(2000(hrs!( TLS: Past, Present, Future – Thyla van der Merwe 16/ 30
  • 29. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Attacking Passwords Widely used for authentication on the web, NOT uniformly distributed RockYou leak of 32 million passwords in 2009, about 14 million unique, 123456 most popular Have a priori information from leaked datasets Multiple bytes, not just one... TLS: Past, Present, Future – Thyla van der Merwe 17/ 30
  • 30. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Attacking Passwords For n bytes we want to maximize Pr(X = x) · Pr(Z = z) where X is the random variable corresponding to a vector of plaintext bytes, x = (x0, x1, . . . , xn−1) Z is the random variable corresponding to the matrix of keystream bytes ?? Pr(Z = z)?? TLS: Past, Present, Future – Thyla van der Merwe 18/ 30
  • 31. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Attacking Passwords For n bytes we want to maximize Pr(X = x) · Pr(Z = z) where X is the random variable corresponding to a vector of plaintext bytes, x = (x0, x1, . . . , xn−1) Z is the random variable corresponding to the matrix of keystream bytes ?? Pr(Z = z)?? TLS: Past, Present, Future – Thyla van der Merwe 18/ 30
  • 32. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Approximations Pr(Z%=%z)%% A"ack&1:&& Assume&keystream&bytes&behave& independently&–&use&single6byte&probabili8es& (product&distribu8on)& A"ack&2:&& Assume&keystream&byte&is&influenced&only&by& byte&directly&adjacent&to&it&–&use&double6&and& single6byte&probabili8es& TLS: Past, Present, Future – Thyla van der Merwe 19/ 30
  • 33. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Approximations a"posteriori"likelihood(of(x(being(( correct(password( !Recovery!algorithm:!( (Compute(most(likely(password(from(((( (dic8onary(of(N(passwords( C1( C2( C3( CS( ...(( r,"r+1,…,"r+n11" encryp8ons(of(fixed(password(( under(different(keys( password(candidate(( (x(=(x0",x1",…,"xn" x0,"x1,"…,"xn" ...(( x0,"x1,"…,"xn" x0,"x1,"…,"xn" x0,"x1,"…,"xn" yields(induced(distribu8on(on( keystream(bytes(Zr,Zr+1,…,Zr+n11"" combine(with(known(distribu8on( approximate!using!known!! distribu:on! combine(with(a"priori"password( distribu8on( TLS: Past, Present, Future – Thyla van der Merwe 20/ 30
  • 34. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS What’s different? n bytes instead of one T attempts before lockout dictionary of size N single-byte vs double-byte estimator Base64 or ASCII r starting position S ciphertexts guessing attacks TLS: Past, Present, Future – Thyla van der Merwe 21/ 30
  • 35. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Simulation Results Use a dictionary built from RockYou leak dataset to attack Singles.org dataset More realistic but limits our success rate Default parameters, n = 6, T = 5, S = 220, 222, . . . , 228 Success rate based on 256 experiments TLS: Past, Present, Future – Thyla van der Merwe 22/ 30
  • 36. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Simulation Results Single-byte vs double-byte, n = 6, T = 5 0 0.2 0.4 0.6 0.8 1 0 64 128 192 256 SuccessRate Starting Position db, 220 db, 222 db, 224 db, 226 db, 228 sb, 220 sb, 222 sb, 224 sb, 226 sb, 228 TLS: Past, Present, Future – Thyla van der Merwe 23/ 30
  • 37. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Simulation Results T vs success rate, n = 6, r = 133 - double-byte and guessing 0 5 10 15 20 25 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 log2(T) Recovery Rate 214 216 218 220 222 224 226 228 optimal guessing TLS: Past, Present, Future – Thyla van der Merwe 24/ 30
  • 38. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Practical Validation Applicable to BasicAuth and IMAP We need multiple, independent encryptions of the password We need the password to be encrypted at a favourable position TLS: Past, Present, Future – Thyla van der Merwe 25/ 30
  • 39. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Practical Validation www.evil.com! www.good.com! PW = 123456! PW! TLS channel! r = 133! Resumption latency of 250ms, 226, 6 parallel connections, 776 hours (at 100ms, 312 hours) TLS: Past, Present, Future – Thyla van der Merwe 26/ 30
  • 40. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS ICSI$Notary$Sta+s+cs$[Jul./Aug.,$2015]$ h=p://notary.icsi.berkeley.edu/$ RC4$at$12.8$%$$ ICSI$Notary$Sta+s+cs$[Mar./Apr.,$2016]$ RC4$at$2.4$%$$ TLS: Past, Present, Future – Thyla van der Merwe 27/ 30
  • 41. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Present Password Recovery Attacks Against RC4 in TLS by Garman et al. (OUR WORK) FREAK by Beurdouche et al., Bar Mitzva Attack by Mantin, LOGJAM, RC4 attack by Vanhoef and Piessens Attack by Jager et. al, SLOTH and DROWN TLS: Past, Present, Future – Thyla van der Merwe 28/ 30
  • 42. Outline Background Past Present Future Password Recovery Attacks Against RC4 in TLS Present 2011$ 2015$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$ $$10$ 2009$ 2012$ 2013$ 2014$ 1998$ 2002$ Password Recovery Attacks Against RC4 in TLS by Garman et al. (OUR WORK) FREAK by Beurdouche et al., Bar Mitzva Attack by Mantin, LOGJAM, RC4 attack by Vanhoef and Piessens Attack by Jager et. al, SLOTH and DROWN TLS: Past, Present, Future – Thyla van der Merwe 28/ 30
  • 43. Outline Background Past Present Future Future 2011$ 2015$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$ $$10$ 2009$ 2012$ 2013$ 2014$ 1998$ 2002$ See my next talk :-) Draft 1 of TLS 1.3 released in March 2015, draft 12 released in March 2016 Encrypt as much of the handshake as possible Re-evaluate the handshake contents - different handshakes, renegotiation handshake removed, resumption done differently 1-RTT for initial handshake, 0-RTT for repeated handshakes, also 0.5-RTT Update the record protection mechanisms TLS: Past, Present, Future – Thyla van der Merwe 29/ 30
  • 44. Outline Background Past Present Future Future 2011$ 2015$ 1995$ 1996$ 1999$ 2006$ 2008$ 2016$ $$10$ 2009$ 2012$ 2013$ 2014$ 1998$ 2002$ See my next talk :-) Draft 1 of TLS 1.3 released in March 2015, draft 12 released in March 2016 Encrypt as much of the handshake as possible Re-evaluate the handshake contents - different handshakes, renegotiation handshake removed, resumption done differently 1-RTT for initial handshake, 0-RTT for repeated handshakes, also 0.5-RTT Update the record protection mechanisms TLS: Past, Present, Future – Thyla van der Merwe 29/ 30
  • 45. Outline Background Past Present Future Takeaways 2011$ 2015$ 2016$ 2009$ 2012$ 2013$ 2014$ 1998$ 2002$ TLS: Past, Present, Future – Thyla van der Merwe 30/ 30