Главная
Study mode:
on
1
Intro
2
About the topic
3
Roadmap
4
What is a RSA signature
5
Recover a RSA private key: Prerequisites
6
What if the attack is successful?
7
(a) RSA Signature with RSA-CRT
8
(c) Presence of faulty signature
9
(b) Signature calculated on known values
10
(b) PKCS 1.5 Padding
11
The right ciphersuite...
12
How High Voltage! works...
13
How RSA works
14
RSA Rule 1
15
Signing with RSA-CRT
16
TLS RSA-CRT Attack in "pills"
17
Vulnerable crypto libraries (2)
18
IKEV1 Phase 1 Main Mode (Signature Auth)
19
IKEv1 Phase 1 Aggressive Mode (Signature Auth)
Description:
Learn how to recover an RSA private key from a TLS session with Perfect Forward Secrecy in this 42-minute Black Hat conference talk. Explore the theory behind the attack, including the generation of faulty digital signatures due to hardware faults, and understand why embedded devices are particularly vulnerable. Discover the prerequisites for a successful attack, examine RSA signatures and RSA-CRT, and analyze vulnerable crypto libraries. Gain insights into the practical implementation of this technique, including both passive and active attack modes. Delve into topics such as PKCS 1.5 padding, suitable ciphersuites, and the workings of the High Voltage! tool. Examine the application of these concepts to IKEv1 Phase 1 Main Mode and Aggressive Mode with signature authentication.

Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy

Black Hat
Add to list