Главная
Study mode:
on
1
Intro
2
Agile Cryptographic Protocols
3
Attacks on Legacy Crypto in TLS
4
TLS protocol overview
5
Protocol Agility in TLS
6
Example Protocol Instance
7
miTLS: New TLS Attacks
8
Anonymous Diffie-Hellman (DHanon)
9
Man-in-the-Middle attack on DH anon
10
SIGMA: Authenticated DH
11
SIGMA with Group Negotiation
12
Logjam: MitM Group Downgrade Attack
13
Downgrade Protection in TLS 1.2
14
Logjam: Exploiting Pre-Computation
15
Logjam: Impact and Countermeasures
16
SIGMA with Generic Negotiation
17
Downgrade Protection via Signatures
18
SLOTH: Transcript Collision Attacks
19
Computing a Transcript Collision
20
Chosen-Prefix Transcript Collisions
21
Other SLOTH Vulnerabilities
22
AKEs with Parameter Negotiation
23
Agile AKE Security Goals
24
Agile Agreement vs. Downgrades
25
A New Downgrade Resilience Goal
26
Testing the Definition
27
TLS 1.3 Negotiation Sub-Protocol
28
Group Negotiation with Retry
29
Full Transcript Signatures
30
Preventing Version Downgrade
31
TLS 1.3 is Downgrade Resilient
32
Final Thoughts
Description:
Explore the intricacies of protecting Transport Layer Security (TLS) from legacy cryptographic vulnerabilities in this comprehensive Eurocrypt 2016 invited talk. Delve into agile cryptographic protocols, attacks on legacy crypto in TLS, and the TLS protocol overview. Examine protocol agility in TLS and learn about new TLS attacks using miTLS. Investigate anonymous Diffie-Hellman (DHanon) and man-in-the-middle attacks, as well as SIGMA authenticated DH with group negotiation. Analyze the Logjam attack, including MitM group downgrade, pre-computation exploitation, and countermeasures. Study downgrade protection mechanisms in TLS 1.2 and via signatures. Explore SLOTH transcript collision attacks and their vulnerabilities. Discuss Agile AKE security goals, downgrade resilience, and test the new definition. Examine the TLS 1.3 negotiation sub-protocol, group negotiation with retry, and full transcript signatures. Understand how TLS 1.3 prevents version downgrades and achieves downgrade resilience. Conclude with final thoughts on protecting TLS from legacy cryptographic vulnerabilities. Read more

Protecting TLS from Legacy Crypto

TheIACR
Add to list