Hunting Invisible Salamanders - Cryptographic Insecurity with Attacker-Controlled Keys
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the cryptographic challenges and vulnerabilities associated with attacker-controlled keys in authenticated encryption schemes. Delve into the evolving landscape of cryptography deployment, focusing on scenarios where attackers can potentially know or guess encryption keys. Examine specific examples such as password-based authenticated encryption and reporting plaintexts, and investigate the concept of committing security. Analyze invisible salamander attacks on Counter Mode and Galois/Counter Mode (GCM), discussing their implications for multi-receiver encryption and abuse reporting in encrypted messaging systems. Learn about Facebook's Message Franking Protocol and techniques to evade message franking. Gain insights into crafting ciphertexts, partitioning oracles, and strategies to prevent invisible salamander attacks. This 31-minute Black Hat conference talk is designed for security professionals involved in cryptography design, implementation, and deployment, while remaining accessible to a general security audience.
Syllabus
Intro
This Talk
Authenticated Encryption
New Settings, New Needs
Overview
Attacker-Controlled Keys
Example: Password-based AE
Example: Reporting Plaintexts
Committing Security for AE
Reporting Salamanders
Invisible Salamanders for CTR Mode
Galois/Counter Mode (GCM)
Colliding GCM's MACA
From Two Keys to Many A
Multi-Receiver Encryption
Abuse Reporting for Encrypted Messaging
Facebook's Message Franking Protocol
Evading Message Franking
Crafting the Ciphertext
Partitioning Oracles
Preventing Invisible Salamanders
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube