Главная
Study mode:
on
1
Introduction
2
Getting Started
3
TLS Encryption
4
symmetric encryption
5
lucky 13 attack
6
RC4 attack
7
GCM
8
Other cryptographers
9
Adam Langley
10
TLS specification
11
Scanning the Internet
12
Tracking Devices
13
Radware
14
Devices
15
Sign For
16
OpenSSL 101
17
Attack Description
18
GCM Background
19
GCM Authentication
20
Highlevel attackers
21
Lowlevel attackers
22
Nonce reuse
23
Fully known polynomial
24
Application in TLS
25
GCM stream cipher
26
Changing the HTML response
27
Attacking the same domain
28
Future trends
29
Conclusion
30
GitHub
31
Session Key
32
Problems with GCM
33
Weak keys in GCM
34
What can we bring to hardware vendors
Description:
Explore a comprehensive analysis of nonce-reuse vulnerabilities in the Galois/Counter Mode (GCM) algorithm within TLS encryption. Delve into the research conducted by security experts, uncovering over 70,000 HTTPS servers at risk of nonce reuse and 184 servers repeating nonces in short connections. Examine the implications for large corporations, financial institutions, and even a credit card company. Learn about the proof-of-concept attack that compromises HTTPS connection authenticity and enables content injection. Gain insights into TLS encryption, symmetric encryption, and various attacks like Lucky 13 and RC4. Understand GCM authentication, nonce reuse consequences, and the technical details of exploiting these vulnerabilities. Discover the researchers' methodology for Internet-wide scanning, tracking devices, and implementing the attack. Explore future trends, potential solutions, and the importance of addressing GCM weaknesses in hardware implementations.

Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS

Black Hat
Add to list
0:00 / 0:00