Главная
Study mode:
on
1
Intro
2
Lesson Learned (the hard way)
3
Standardized Designs
4
CTR_DRBG: Design
5
CTR_DRBG: Generate Function
6
Key Rotation Flaw
7
Problem 1: Key Not Rotated Often Enough
8
Problem 2: Lack of Entropy
9
Is a side-channel attack on CTR_DRBG realistic?
10
FIPS Requirements
11
Finding long PRG outputs in TLS handshake
12
Attack Scenario
13
Attacking TLS 1.2 RSA key exchange with client auth
14
Results: State Recovery
15
Attack Complexity
16
AES Internal State
17
Examining the Differential Structure
18
Differential Attack
19
Towards a realistic attack
20
Interrupting SGX Execution
21
First Attempt
22
Experimental Setup
23
Lessons
Description:
Explore a presentation from WAC 2020 examining cache attacks on CTR_DRBG, a standardized pseudorandom number generator. Delve into the design flaws of CTR_DRBG, including key rotation issues and lack of entropy. Investigate the feasibility of side-channel attacks on this generator and their implications for TLS handshakes. Analyze attack scenarios targeting TLS 1.2 RSA key exchange with client authentication, and examine state recovery techniques. Study the differential structure of AES internal states and learn about experimental setups for interrupting SGX execution. Gain insights into the complexities of cryptographic implementations and the importance of robust security measures in standardized designs.

Pseudorandom Black Swans: Cache Attacks on CTR_DRBG

TheIACR
Add to list
0:00 / 0:00