Главная
Study mode:
on
1
Intro
2
This Talk
3
Authenticated Encryption
4
New Settings, New Needs
5
Overview
6
Attacker-Controlled Keys
7
Example: Password-based AE
8
Example: Reporting Plaintexts
9
Committing Security for AE
10
Reporting Salamanders
11
Invisible Salamanders for CTR Mode
12
Galois/Counter Mode (GCM)
13
Colliding GCM's MACA
14
From Two Keys to Many A
15
Multi-Receiver Encryption
16
Abuse Reporting for Encrypted Messaging
17
Facebook's Message Franking Protocol
18
Evading Message Franking
19
Crafting the Ciphertext
20
Partitioning Oracles
21
Preventing Invisible Salamanders
Description:
Explore the cryptographic challenges and vulnerabilities associated with attacker-controlled keys in authenticated encryption schemes. Delve into the evolving landscape of cryptography deployment, focusing on scenarios where attackers can potentially know or guess encryption keys. Examine specific examples such as password-based authenticated encryption and reporting plaintexts, and investigate the concept of committing security. Analyze invisible salamander attacks on Counter Mode and Galois/Counter Mode (GCM), discussing their implications for multi-receiver encryption and abuse reporting in encrypted messaging systems. Learn about Facebook's Message Franking Protocol and techniques to evade message franking. Gain insights into crafting ciphertexts, partitioning oracles, and strategies to prevent invisible salamander attacks. This 31-minute Black Hat conference talk is designed for security professionals involved in cryptography design, implementation, and deployment, while remaining accessible to a general security audience. Read more

Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys

Black Hat
Add to list