YoVDO

Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Cryptography Courses Network Security Courses Perfect Forward Secrecy Courses

Course Description

Overview

Learn how to recover an RSA private key from a TLS session with Perfect Forward Secrecy in this 42-minute Black Hat conference talk. Explore the theory behind the attack, including the generation of faulty digital signatures due to hardware faults, and understand why embedded devices are particularly vulnerable. Discover the prerequisites for a successful attack, examine RSA signatures and RSA-CRT, and analyze vulnerable crypto libraries. Gain insights into the practical implementation of this technique, including both passive and active attack modes. Delve into topics such as PKCS 1.5 padding, suitable ciphersuites, and the workings of the High Voltage! tool. Examine the application of these concepts to IKEv1 Phase 1 Main Mode and Aggressive Mode with signature authentication.

Syllabus

Intro
About the topic
Roadmap
What is a RSA signature
Recover a RSA private key: Prerequisites
What if the attack is successful?
(a) RSA Signature with RSA-CRT
(c) Presence of faulty signature
(b) Signature calculated on known values
(b) PKCS 1.5 Padding
The right ciphersuite...
How High Voltage! works...
How RSA works
RSA Rule 1
Signing with RSA-CRT
TLS RSA-CRT Attack in "pills"
Vulnerable crypto libraries (2)
IKEV1 Phase 1 Main Mode (Signature Auth)
IKEv1 Phase 1 Aggressive Mode (Signature Auth)


Taught by

Black Hat

Related Courses

Everything Related to Transport Layer Security - TLS
Hussein Nasser via YouTube
SSL-TLS and Why It Keeps Your Lake Empty - Andy Shepherd, Symantec
The Cyber Academy via YouTube
Perfect Forward Secrecy in TLS Explained
Hussein Nasser via YouTube
Seven Grades of Perfect Forward Secrecy
LASCON via YouTube
Cunning With CNG - Soliciting Secrets From Schannel
Black Hat via YouTube