Главная
Study mode:
on
1
Intro
2
Cryptanalysis - ECDSA Nonce
3
Side-Channel Cryptanalysis
4
Side-Channel Attacks
5
Trusted Platform Module (TPM)
6
TPM - Digital Signatures
7
Trusted Computing Group
8
High-resolution Timing Test - Intel PTT (FTPM)
9
Lattice and Hidden Number Problem
10
TPM-Fail - Key Recovery Results
11
TPM-Fail Case Study: StrongSwan VPN
12
Remote StrongSwan VPN
13
CacheQuote (2)
14
Cryptographic Implementation is Hard - ECDSA
15
MicroWalk Approach
16
MicroWalk Implementation
17
Questions?!
Description:
Explore a comprehensive analysis of Trusted Platform Module (TPM) vulnerabilities in this WAC 2020 presentation by Daniel Moghimi. Delve into cryptanalysis techniques, focusing on ECDSA nonce side-channel attacks and their implications for TPM security. Examine high-resolution timing tests on Intel PTT (FTPM) and understand the application of lattice-based cryptanalysis to the hidden number problem. Investigate the TPM-Fail key recovery results and their real-world impact through a case study on StrongSwan VPN. Learn about the challenges of secure cryptographic implementation, particularly for ECDSA, and discover the MicroWalk approach for identifying potential vulnerabilities. Gain valuable insights into the complexities of trusted computing and the importance of robust cryptographic implementations in modern security systems.

TPM-FAIL - TPM Meetings Timing and Lattice Attacks

TheIACR
Add to list
0:00 / 0:00