Главная
Study mode:
on
1
Intro
2
A Few Words About PAKES
3
Why Looking at PAKES?
4
What about SRP?
5
SRP Protocol Overview
6
Contributions
7
FLUSH+RELOAD
8
Our Main Result
9
Modular exponentiation in OpenSSL
10
Optimized Square-and-Multiply
11
Attacker Model
12
Classical Workflow
13
Trace Acquisition
14
Trace Interpretation
15
Dictionary Attack
16
Single Measurement Attack
17
Impacted Projects
18
Impacted Languages
19
Mitigations
20
Patching process
21
Conclusion
Description:
Explore a comprehensive analysis of Password Recovery Attacks against SRP Implementations in the Wild in this 29-minute conference talk from the Workshop on Attacks in Cryptography 2021. Delve into the intricacies of Password-Authenticated Key Exchange (PAKE) protocols, focusing on the Secure Remote Password (SRP) protocol. Examine the FLUSH+RELOAD technique, modular exponentiation in OpenSSL, and optimized square-and-multiply algorithms. Understand the attacker model, classical workflow, trace acquisition, and interpretation methods. Discover the impact on various projects and programming languages, and learn about potential mitigations and the patching process for enhanced security.

PARASITE - Password Recovery Attack Against SRP Implementations in the Wild

TheIACR
Add to list