Главная
Study mode:
on
1
Intro
2
TLS-DH(E)
3
Constant Time Execution
4
Attack Overview
5
Retrieving the PMS
6
Key Derivation in TLS
7
Merkle-Damgård-Construction
8
Hashfunction Performance (expectation)
9
SSL 3 Key Derivation
10
TLS 1.0/1.1 PRF
11
HMAC in the PRF
12
Attacker can choose Hash Functions
13
Measurement Errors
14
Special Timing Measurement Equipment
15
Direct Raccoon + Non-Determinism
16
Impact
17
Countermeasure
18
So.... no Side-Channel?
19
Raccoon and ECDH(E)
20
Raccoon and TLS 1.3
21
Raccoon and eTLS/ETS
22
Why the mess?
23
Raccoon & DH(E) Proofs
24
PRF-ODH Assumption
25
Raccoon and other Protocols
26
Conclusion
Description:
Explore the intricacies of the Raccoon Attack, a cryptographic vulnerability affecting TLS-DH(E), in this conference talk delivered by Robert Merget at the Workshop on Attacks in Cryptography during Crypto 2021. Delve into the fundamentals of TLS-DH(E) and constant time execution before examining the attack's methodology for retrieving the PMS (Pre-Master Secret). Analyze key derivation processes in TLS, including the Merkle-Damgård construction and hashfunction performance expectations. Investigate SSL 3 key derivation, TLS 1.0/1.1 PRF, and the role of HMAC in the PRF. Learn about measurement errors, special timing measurement equipment, and the challenges of direct Raccoon attacks with non-determinism. Assess the impact of the Raccoon Attack and explore potential countermeasures. Extend the discussion to Raccoon's implications for ECDH(E), TLS 1.3, and eTLS/ETS. Examine the underlying reasons for these vulnerabilities and their relation to the PRF-ODH assumption. Conclude by considering Raccoon's potential effects on other protocols, gaining a comprehensive understanding of this significant cryptographic exploit. Read more

Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)

TheIACR
Add to list
0:00 / 0:00