YoVDO

PARASITE - Password Recovery Attack Against SRP Implementations in the Wild

Offered By: TheIACR via YouTube

Tags

Cryptography Courses Cybersecurity Courses Dictionary Attacks Courses OpenSSL Courses

Course Description

Overview

Explore a comprehensive analysis of Password Recovery Attacks against SRP Implementations in the Wild in this 29-minute conference talk from the Workshop on Attacks in Cryptography 2021. Delve into the intricacies of Password-Authenticated Key Exchange (PAKE) protocols, focusing on the Secure Remote Password (SRP) protocol. Examine the FLUSH+RELOAD technique, modular exponentiation in OpenSSL, and optimized square-and-multiply algorithms. Understand the attacker model, classical workflow, trace acquisition, and interpretation methods. Discover the impact on various projects and programming languages, and learn about potential mitigations and the patching process for enhanced security.

Syllabus

Intro
A Few Words About PAKES
Why Looking at PAKES?
What about SRP?
SRP Protocol Overview
Contributions
FLUSH+RELOAD
Our Main Result
Modular exponentiation in OpenSSL
Optimized Square-and-Multiply
Attacker Model
Classical Workflow
Trace Acquisition
Trace Interpretation
Dictionary Attack
Single Measurement Attack
Impacted Projects
Impacted Languages
Mitigations
Patching process
Conclusion


Taught by

TheIACR

Related Courses

Advanced Cyber Security Training: Hands-On Password Attacks
EC-Council via FutureLearn
Credential Access with Hashcat
Pluralsight
Web App Hacking: Hacking Authentication
Pluralsight
VPNs and Wireless Networks
Pluralsight
Httpillage - Calling All Nodes
LASCON via YouTube