TPM-FAIL - TPM Meetings Timing and Lattice Attacks
Offered By: TheIACR via YouTube
Course Description
Overview
Explore a comprehensive analysis of Trusted Platform Module (TPM) vulnerabilities in this WAC 2020 presentation by Daniel Moghimi. Delve into cryptanalysis techniques, focusing on ECDSA nonce side-channel attacks and their implications for TPM security. Examine high-resolution timing tests on Intel PTT (FTPM) and understand the application of lattice-based cryptanalysis to the hidden number problem. Investigate the TPM-Fail key recovery results and their real-world impact through a case study on StrongSwan VPN. Learn about the challenges of secure cryptographic implementation, particularly for ECDSA, and discover the MicroWalk approach for identifying potential vulnerabilities. Gain valuable insights into the complexities of trusted computing and the importance of robust cryptographic implementations in modern security systems.
Syllabus
Intro
Cryptanalysis - ECDSA Nonce
Side-Channel Cryptanalysis
Side-Channel Attacks
Trusted Platform Module (TPM)
TPM - Digital Signatures
Trusted Computing Group
High-resolution Timing Test - Intel PTT (FTPM)
Lattice and Hidden Number Problem
TPM-Fail - Key Recovery Results
TPM-Fail Case Study: StrongSwan VPN
Remote StrongSwan VPN
CacheQuote (2)
Cryptographic Implementation is Hard - ECDSA
MicroWalk Approach
MicroWalk Implementation
Questions?!
Taught by
TheIACR
Related Courses
LPI Linux Essentials CertificationA Cloud Guru LPIC-2: Linux Engineer Exam 202
A Cloud Guru LPIC-2: Linux Engineer Exam 202-450 Preparation
A Cloud Guru System and Network Security
LearnKartS via Coursera Linux PAM Security Administration
Packt via Coursera