YoVDO

Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Symmetric Encryption Courses TLS Courses

Course Description

Overview

Explore a comprehensive analysis of nonce-reuse vulnerabilities in the Galois/Counter Mode (GCM) algorithm within TLS encryption. Delve into the research conducted by security experts, uncovering over 70,000 HTTPS servers at risk of nonce reuse and 184 servers repeating nonces in short connections. Examine the implications for large corporations, financial institutions, and even a credit card company. Learn about the proof-of-concept attack that compromises HTTPS connection authenticity and enables content injection. Gain insights into TLS encryption, symmetric encryption, and various attacks like Lucky 13 and RC4. Understand GCM authentication, nonce reuse consequences, and the technical details of exploiting these vulnerabilities. Discover the researchers' methodology for Internet-wide scanning, tracking devices, and implementing the attack. Explore future trends, potential solutions, and the importance of addressing GCM weaknesses in hardware implementations.

Syllabus

Introduction
Getting Started
TLS Encryption
symmetric encryption
lucky 13 attack
RC4 attack
GCM
Other cryptographers
Adam Langley
TLS specification
Scanning the Internet
Tracking Devices
Radware
Devices
Sign For
OpenSSL 101
Attack Description
GCM Background
GCM Authentication
Highlevel attackers
Lowlevel attackers
Nonce reuse
Fully known polynomial
Application in TLS
GCM stream cipher
Changing the HTML response
Attacking the same domain
Future trends
Conclusion
GitHub
Session Key
Problems with GCM
Weak keys in GCM
What can we bring to hardware vendors


Taught by

Black Hat

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network