SlideShare a Scribd company logo
1 of 47
André Joaquim, Miguel L. Pardal, Miguel Correia
INESC-ID, Instituto Superior Técnico, Universidade de Lisboa
Lisboa, Portugal
Vulnerability-Tolerant
Transport Layer Security
December 20th, 2017
project [EU H2020]
• Secure Storage
• Secure Queries
• Secure Communications
– Same properties as secure channels (TLS)
• Authentication of endpoints
• Confidentiality
• Integrity
– Assuming very powerful adversaries that
may break some of the usual assumptions
3
4
HTTPS = HTTP + SSL/TLS
5
HTTPS = HTTP + SSL/TLS
6
What are the problems?
• Many vulnerabilities have been discovered in
TLS – in the protocol specification and
in the implementations
• TLS uses only one cipher suite
• TLS supports deprecated mechanisms
8
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
10
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
11
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
12
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
13
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
14
TLS Protocol layers
• E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256
15
Vulnerability-Tolerant TLS
18
19
vtTLS architecture
• Protocol for diverse and redundant
vulnerability-tolerant communication
channels
• Client and server negotiate k cipher suites
• A subset of the k cipher suites are used to
secure the messages during communication
vtTLS in action
20
vtTLS in action
21
vtTLS in action
22
23
Example of a
possible TLS
Handshake
24
Example of a
possible vtTLS
Handshake
Combining cipher suites
25
• Combining diverse cipher suites is not trivial
• Different metrics for prioritization of mechanisms:
– Perfect forward secrecy
– Disjoint mathematical hard problems
Combining hash functions
• SHA-1 + SHA-3
– Not possible in vtTLS as SHA-1 is not recommended
and TLS 1.2 does not support SHA-3
• SHA-1 + Whirlpool
– Not possible in vtTLS as SHA-1 is not recommended
and TLS 1.2 does not support Whirlpool
• SHA-2 + SHA-3
– Also not possible in vtTLS as TLS 1.2 does not
support SHA-3
• Some diversity still possible by using different
variants of SHA-2: SHA-256 and SHA-384
26
Combining public key encryption
• Used for authentication and key exchange
• DSA + RSA
– Possible as TLS 1.2 supports both functions for authentication
– However, TLS 1.2 specific cipher suites only support DSA with
elliptic curves (ECDSA)
• DSA + Rabin-Williams
– Not possible as TLS 1.2 does not support Rabin-Williams
• RSA + ECDH
– Possible as TLS 1.2 supports both functions for key exchange
• RSA + ECDSA
– Possible as TLS 1.2 supports both functions for authentication
27
Combining public crypto for authentication
• Most diverse combination:
DSA + RSA
• TLS 1.2 preferred cipher suites use
ECDSA instead of DSA
– Using elliptic curves results in faster
computation and lower power consumption
• Preferred combination for authentication:
RSA + ECDSA
28
Combining public crypto for key exchange
• Most diverse combination:
RSA + ECDH
– To grant perfect forward secrecy, the ECDH with
Ephemeral keys (ECDHE) has to be employed
• Preferred combination for key exchange:
RSA + ECDHE
29
Combining symmetric ciphers
• AES supported by TLS 1.2
• Camellia also supported by TLS 1.2
• The most diverse combination is
AES256-GCM + CAMELLIA128-CBC
– But there is no cipher suite that uses RSA for
key exchange, Camellia for encryption, SHA-
2 for MAC in OpenSSL 1.0.2.g
• AES256-GCM + AES128
– Possible as TLS 1.2 supports both functions
30
Current choice of cipher suites (k=2)
31
• The combination we chose is
– ECDHE-ECDSA + AES-256-GCM + SHA384 (SHA-2)
– RSA + AES-128-CBC + SHA256 (SHA-2)
vtTLS before protection
32
33
Example of vtTLS
Application Data
Encryption
Process
Header
34
Example of vtTLS
Application Data
Encryption
Process
Header
First IV
Message
35
Example of vtTLS
Application Data
Encryption
Process
Header
First IV
Message
First MAC
36
Example of vtTLS
Application Data
Encryption
Process
Header
First IV
Message
First MAC
= First Ciphertext
vtTLS with 1 layer of protection
37
38
Example of vtTLS
Application Data
Encryption
Process
Second IV
First ciphertext
39
Example of vtTLS
Application Data
Encryption
Process
Second IV
First ciphertext
Second MAC
40
Example of vtTLS
Application Data
Encryption
Process
Second
ciphertext
vtTLS with 2 layers of protection
41
Experimental Evaluation
42
Implementation
43
• Option 1: Implement vtTLS from scratch
– Would take a long time
– Could have possible implementation
vulnerabilities
• Option 2: Modify an existent TLS (OpenSSL)
implementation to support vtTLS
– Widely used and tested
– Less entry barriers
vtTLS
• Protocol TLS 1.2
• Code fork of
OpenSSL 1.0.2.g
44
https://github.com/inesc-id/vtTLS/wiki
Implementation
• OpenSSL is a very
complex library
• Approx. 440K lines of
code
• Well structured
• Optimized for
performance, not for
change
45
46
Average of the handshake length (ms)
0
0,5
1
1,5
2
2,5
3
3,5
4
4,5
vtTLS OpenSSL
Establishing a
connection is
66.7% slower
47
Average time to send/receive a message (ms)
0
1000
2000
3000
4000
5000
6000
7000
8000
9000
1 MB 10 MB 50 MB 100 MB 500 MB 1 GB
Message Size
vtTLS Send vtTLS Receive OpenSSL Send OpenSSL Receive
Takes just
22.9% longer to
send messages
48
0
1
2
3
4
5
6
100 000 1 000 000 100 000 000
vtTLS OpenSSL
% of increased size of the encrypted message
Negligible
message size
increase
Evaluation summary
• vtTLS is, in average, 66.7% slower
establishing a connection
• A message sent through a vtTLS channel
takes in average 22.9% longer
• Sending 100 MB through a vtTLS channel
costs an additional approx. 405 KB
49
Conclusion
• vtTLS is a protocol for diverse and redundant
vulnerability-tolerant secure communication
channels
• Provides an interesting trade-off for a set of
critical security applications
• Viable for non-timely critical applications
50
Future Work
• Optimize handshake, reuse sessions
• Use more mechanisms when available
– SHA-3 and Camellia
• Introduce diversity of implementations
• Compare vtTLS with TLS-over-TLS tunneling
51
52
Thank you!
Miguel.Pardal@tecnico.ulisboa.pt
http://www.safecloud-project.eu/
This work was supported by the European Commission through project
H2020-653884 (SafeCloud) and by national funds through Fundação para a
Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013 (INESC-ID)
Slide contributions: André Joaquim, Ricardo Moura, Sree Harsha Totakura

More Related Content

What's hot

OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaSean Roberts
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaMrinal Wadhwa
 
OpenStack Networking and Automation
OpenStack Networking and AutomationOpenStack Networking and Automation
OpenStack Networking and AutomationAdam Johnson
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. EncryptionSam Bowne
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Khaled Mosharraf
 
Open daylight and Openstack
Open daylight and OpenstackOpen daylight and Openstack
Open daylight and OpenstackDave Neary
 
Linux Tag 2014 OpenStack Networking
Linux Tag 2014 OpenStack NetworkingLinux Tag 2014 OpenStack Networking
Linux Tag 2014 OpenStack Networkingyfauser
 
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat Security Conference
 
SNAPL Network Verification
SNAPL Network VerificationSNAPL Network Verification
SNAPL Network Verificationaurojit
 
OpenStack networking (Neutron)
OpenStack networking (Neutron) OpenStack networking (Neutron)
OpenStack networking (Neutron) CREATE-NET
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006Nate Lawson
 
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)NETWAYS
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersSam Bowne
 
The Nightmare of Locking, Blocking and Isolation Levels
The Nightmare of Locking, Blocking and Isolation LevelsThe Nightmare of Locking, Blocking and Isolation Levels
The Nightmare of Locking, Blocking and Isolation LevelsBoris Hristov
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Dave Neary
 

What's hot (20)

OpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by AkandaOpenStack Neutron Advanced Services by Akanda
OpenStack Neutron Advanced Services by Akanda
 
Transport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal WadhwaTransport Layer Security - Mrinal Wadhwa
Transport Layer Security - Mrinal Wadhwa
 
OpenStack Networking and Automation
OpenStack Networking and AutomationOpenStack Networking and Automation
OpenStack Networking and Automation
 
CNIT 141: 1. Encryption
CNIT 141: 1. EncryptionCNIT 141: 1. Encryption
CNIT 141: 1. Encryption
 
Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.
 
Open daylight and Openstack
Open daylight and OpenstackOpen daylight and Openstack
Open daylight and Openstack
 
Linux Tag 2014 OpenStack Networking
Linux Tag 2014 OpenStack NetworkingLinux Tag 2014 OpenStack Networking
Linux Tag 2014 OpenStack Networking
 
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
 
SNAPL Network Verification
SNAPL Network VerificationSNAPL Network Verification
SNAPL Network Verification
 
SSLv3 and POODLE
SSLv3 and POODLESSLv3 and POODLE
SSLv3 and POODLE
 
OpenStack networking (Neutron)
OpenStack networking (Neutron) OpenStack networking (Neutron)
OpenStack networking (Neutron)
 
Poodle
PoodlePoodle
Poodle
 
TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006TLS/SSL Protocol Design 201006
TLS/SSL Protocol Design 201006
 
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)
OSDC 2015: Jan-Piet Mens | MQTT for your data center (and for the IoT)
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Ssl attacks
Ssl attacksSsl attacks
Ssl attacks
 
The Nightmare of Locking, Blocking and Isolation Levels
The Nightmare of Locking, Blocking and Isolation LevelsThe Nightmare of Locking, Blocking and Isolation Levels
The Nightmare of Locking, Blocking and Isolation Levels
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Poodle
PoodlePoodle
Poodle
 
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
Networking in OpenStack for non-networking people: Neutron, Open vSwitch and ...
 

Similar to Vulnerability-tolerant Transport Layer Security

ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxjithu26327
 
Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacksAlexandre Moneger
 
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuardCentral Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuardAndrew Denner
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Cloudflare
 
Introduction to TLS-1.3
Introduction to TLS-1.3 Introduction to TLS-1.3
Introduction to TLS-1.3 Vedant Jain
 
The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)Mathias Slawik
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...Aaron Zauner
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!OWASP
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLSSam Bowne
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured CommunicationsNitin Ramesh
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLSSam Bowne
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)Jerome Smith
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security ApplicationsHatem Mahmoud
 
Reinventing anon email
Reinventing anon emailReinventing anon email
Reinventing anon emailantitree
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLSSam Bowne
 

Similar to Vulnerability-tolerant Transport Layer Security (20)

ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Pentesting custom TLS stacks
Pentesting custom TLS stacksPentesting custom TLS stacks
Pentesting custom TLS stacks
 
CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS CS6004 CYBER FORENSICS
CS6004 CYBER FORENSICS
 
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuardCentral Iowa Linux Users Group May 2020 Meeting: WireGuard
Central Iowa Linux Users Group May 2020 Meeting: WireGuard
 
Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)Why Many Websites are still Insecure (and How to Fix Them)
Why Many Websites are still Insecure (and How to Fix Them)
 
Introduction to TLS-1.3
Introduction to TLS-1.3 Introduction to TLS-1.3
Introduction to TLS-1.3
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
SSL overview
SSL overviewSSL overview
SSL overview
 
The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)The Trusted Cloud Transfer Protocol (TCTP)
The Trusted Cloud Transfer Protocol (TCTP)
 
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
No need for Black Chambers: Testing TLS in the E-Mail Ecosystem at Large (hac...
 
Cours4.pptx
Cours4.pptxCours4.pptx
Cours4.pptx
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
 
CNIT 141: 13. TLS
CNIT 141: 13. TLSCNIT 141: 13. TLS
CNIT 141: 13. TLS
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
Network Security Applications
Network Security ApplicationsNetwork Security Applications
Network Security Applications
 
Reinventing anon email
Reinventing anon emailReinventing anon email
Reinventing anon email
 
CNIT 141 13. TLS
CNIT 141 13. TLSCNIT 141 13. TLS
CNIT 141 13. TLS
 

More from Miguel Pardal

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Miguel Pardal
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Miguel Pardal
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)Miguel Pardal
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Miguel Pardal
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsMiguel Pardal
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasMiguel Pardal
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Miguel Pardal
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsMiguel Pardal
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentationMiguel Pardal
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Miguel Pardal
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)Miguel Pardal
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10Miguel Pardal
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)Miguel Pardal
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginnersMiguel Pardal
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discoveryMiguel Pardal
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigaçãoMiguel Pardal
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentationMiguel Pardal
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classMiguel Pardal
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainMiguel Pardal
 

More from Miguel Pardal (20)

Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023Master Beginners Workshop - Feb 2023
Master Beginners Workshop - Feb 2023
 
Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019Master Beginners Workshop - September 2019
Master Beginners Workshop - September 2019
 
SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)SafeCloud Secure Communication solutions (WP1 overview)
SafeCloud Secure Communication solutions (WP1 overview)
 
Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018Master Beginners' Workshop September 2018
Master Beginners' Workshop September 2018
 
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fieldsIoT Middleware for Precision Agriculture: workforce monitoring in olive fields
IoT Middleware for Precision Agriculture: workforce monitoring in olive fields
 
Rastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) CoisasRastreabilidade na Internet das (muitas) Coisas
Rastreabilidade na Internet das (muitas) Coisas
 
Master Beginners
Master BeginnersMaster Beginners
Master Beginners
 
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
Arranque Seguro de Redes 6LoWPAN para prevenir Ataques Vampiro na Internet da...
 
Precision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of ThingsPrecision Agriculture with Sensors and Technologies from the Internet of Things
Precision Agriculture with Sensors and Technologies from the Internet of Things
 
Smart Places INForum16 presentation
Smart Places INForum16 presentationSmart Places INForum16 presentation
Smart Places INForum16 presentation
 
Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)Eclipse workshop presentation (March 2016)
Eclipse workshop presentation (March 2016)
 
LaTeX workshop (NEB)
LaTeX workshop (NEB)LaTeX workshop (NEB)
LaTeX workshop (NEB)
 
Thesis for beginners 2015-10
Thesis for beginners 2015-10Thesis for beginners 2015-10
Thesis for beginners 2015-10
 
LaTeX workshop (JEQ)
LaTeX workshop (JEQ)LaTeX workshop (JEQ)
LaTeX workshop (JEQ)
 
Thesis for beginners
Thesis for beginnersThesis for beginners
Thesis for beginners
 
Scalable and secure RFID data discovery
Scalable and secure RFID data discoveryScalable and secure RFID data discovery
Scalable and secure RFID data discovery
 
Breve introdução à investigação
Breve introdução à investigaçãoBreve introdução à investigação
Breve introdução à investigação
 
Eclipse workshop presentation
Eclipse workshop presentationEclipse workshop presentation
Eclipse workshop presentation
 
BEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things classBEST Lisboa 2013 - The Internet of Things class
BEST Lisboa 2013 - The Internet of Things class
 
Expressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chainExpressive RFID data access policies for the Pharmaceuticals supply chain
Expressive RFID data access policies for the Pharmaceuticals supply chain
 

Recently uploaded

THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.PraveenaKalaiselvan1
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024AyushiRastogi48
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsssuserddc89b
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologycaarthichand2003
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxMurugaveni B
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real timeSatoshi NAKAHIRA
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxEran Akiva Sinbar
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)riyaescorts54
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Nistarini College, Purulia (W.B) India
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
preservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxpreservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxnoordubaliya2003
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxmalonesandreagweneth
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 

Recently uploaded (20)

THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Munirka Delhi 💯Call Us 🔝8264348440🔝
 
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
BIOETHICS IN RECOMBINANT DNA TECHNOLOGY.
 
Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024Vision and reflection on Mining Software Repositories research in 2024
Vision and reflection on Mining Software Repositories research in 2024
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
TOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physicsTOPIC 8 Temperature and Heat.pdf physics
TOPIC 8 Temperature and Heat.pdf physics
 
Davis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technologyDavis plaque method.pptx recombinant DNA technology
Davis plaque method.pptx recombinant DNA technology
 
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptxSTOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
STOPPED FLOW METHOD & APPLICATION MURUGAVENI B.pptx
 
Grafana in space: Monitoring Japan's SLIM moon lander in real time
Grafana in space: Monitoring Japan's SLIM moon lander  in real timeGrafana in space: Monitoring Japan's SLIM moon lander  in real time
Grafana in space: Monitoring Japan's SLIM moon lander in real time
 
The dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptxThe dark energy paradox leads to a new structure of spacetime.pptx
The dark energy paradox leads to a new structure of spacetime.pptx
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
(9818099198) Call Girls In Noida Sector 14 (NOIDA ESCORTS)
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...Bentham & Hooker's Classification. along with the merits and demerits of the ...
Bentham & Hooker's Classification. along with the merits and demerits of the ...
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
preservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptxpreservation, maintanence and improvement of industrial organism.pptx
preservation, maintanence and improvement of industrial organism.pptx
 
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptxLIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
LIGHT-PHENOMENA-BY-CABUALDIONALDOPANOGANCADIENTE-CONDEZA (1).pptx
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 

Vulnerability-tolerant Transport Layer Security

  • 1. André Joaquim, Miguel L. Pardal, Miguel Correia INESC-ID, Instituto Superior Técnico, Universidade de Lisboa Lisboa, Portugal Vulnerability-Tolerant Transport Layer Security December 20th, 2017
  • 2. project [EU H2020] • Secure Storage • Secure Queries • Secure Communications – Same properties as secure channels (TLS) • Authentication of endpoints • Confidentiality • Integrity – Assuming very powerful adversaries that may break some of the usual assumptions 3
  • 3. 4
  • 4. HTTPS = HTTP + SSL/TLS 5
  • 5. HTTPS = HTTP + SSL/TLS 6
  • 6. What are the problems? • Many vulnerabilities have been discovered in TLS – in the protocol specification and in the implementations • TLS uses only one cipher suite • TLS supports deprecated mechanisms 8
  • 7. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 10
  • 8. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 11
  • 9. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 12
  • 10. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 13
  • 11. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 14
  • 12. TLS Protocol layers • E.g.: TLS_RSA_WITH_AES_128_CBC_SHA256 15
  • 14. 19 vtTLS architecture • Protocol for diverse and redundant vulnerability-tolerant communication channels • Client and server negotiate k cipher suites • A subset of the k cipher suites are used to secure the messages during communication
  • 18. 23 Example of a possible TLS Handshake
  • 19. 24 Example of a possible vtTLS Handshake
  • 20. Combining cipher suites 25 • Combining diverse cipher suites is not trivial • Different metrics for prioritization of mechanisms: – Perfect forward secrecy – Disjoint mathematical hard problems
  • 21. Combining hash functions • SHA-1 + SHA-3 – Not possible in vtTLS as SHA-1 is not recommended and TLS 1.2 does not support SHA-3 • SHA-1 + Whirlpool – Not possible in vtTLS as SHA-1 is not recommended and TLS 1.2 does not support Whirlpool • SHA-2 + SHA-3 – Also not possible in vtTLS as TLS 1.2 does not support SHA-3 • Some diversity still possible by using different variants of SHA-2: SHA-256 and SHA-384 26
  • 22. Combining public key encryption • Used for authentication and key exchange • DSA + RSA – Possible as TLS 1.2 supports both functions for authentication – However, TLS 1.2 specific cipher suites only support DSA with elliptic curves (ECDSA) • DSA + Rabin-Williams – Not possible as TLS 1.2 does not support Rabin-Williams • RSA + ECDH – Possible as TLS 1.2 supports both functions for key exchange • RSA + ECDSA – Possible as TLS 1.2 supports both functions for authentication 27
  • 23. Combining public crypto for authentication • Most diverse combination: DSA + RSA • TLS 1.2 preferred cipher suites use ECDSA instead of DSA – Using elliptic curves results in faster computation and lower power consumption • Preferred combination for authentication: RSA + ECDSA 28
  • 24. Combining public crypto for key exchange • Most diverse combination: RSA + ECDH – To grant perfect forward secrecy, the ECDH with Ephemeral keys (ECDHE) has to be employed • Preferred combination for key exchange: RSA + ECDHE 29
  • 25. Combining symmetric ciphers • AES supported by TLS 1.2 • Camellia also supported by TLS 1.2 • The most diverse combination is AES256-GCM + CAMELLIA128-CBC – But there is no cipher suite that uses RSA for key exchange, Camellia for encryption, SHA- 2 for MAC in OpenSSL 1.0.2.g • AES256-GCM + AES128 – Possible as TLS 1.2 supports both functions 30
  • 26. Current choice of cipher suites (k=2) 31 • The combination we chose is – ECDHE-ECDSA + AES-256-GCM + SHA384 (SHA-2) – RSA + AES-128-CBC + SHA256 (SHA-2)
  • 28. 33 Example of vtTLS Application Data Encryption Process Header
  • 29. 34 Example of vtTLS Application Data Encryption Process Header First IV Message
  • 30. 35 Example of vtTLS Application Data Encryption Process Header First IV Message First MAC
  • 31. 36 Example of vtTLS Application Data Encryption Process Header First IV Message First MAC = First Ciphertext
  • 32. vtTLS with 1 layer of protection 37
  • 33. 38 Example of vtTLS Application Data Encryption Process Second IV First ciphertext
  • 34. 39 Example of vtTLS Application Data Encryption Process Second IV First ciphertext Second MAC
  • 35. 40 Example of vtTLS Application Data Encryption Process Second ciphertext
  • 36. vtTLS with 2 layers of protection 41
  • 38. Implementation 43 • Option 1: Implement vtTLS from scratch – Would take a long time – Could have possible implementation vulnerabilities • Option 2: Modify an existent TLS (OpenSSL) implementation to support vtTLS – Widely used and tested – Less entry barriers
  • 39. vtTLS • Protocol TLS 1.2 • Code fork of OpenSSL 1.0.2.g 44 https://github.com/inesc-id/vtTLS/wiki
  • 40. Implementation • OpenSSL is a very complex library • Approx. 440K lines of code • Well structured • Optimized for performance, not for change 45
  • 41. 46 Average of the handshake length (ms) 0 0,5 1 1,5 2 2,5 3 3,5 4 4,5 vtTLS OpenSSL Establishing a connection is 66.7% slower
  • 42. 47 Average time to send/receive a message (ms) 0 1000 2000 3000 4000 5000 6000 7000 8000 9000 1 MB 10 MB 50 MB 100 MB 500 MB 1 GB Message Size vtTLS Send vtTLS Receive OpenSSL Send OpenSSL Receive Takes just 22.9% longer to send messages
  • 43. 48 0 1 2 3 4 5 6 100 000 1 000 000 100 000 000 vtTLS OpenSSL % of increased size of the encrypted message Negligible message size increase
  • 44. Evaluation summary • vtTLS is, in average, 66.7% slower establishing a connection • A message sent through a vtTLS channel takes in average 22.9% longer • Sending 100 MB through a vtTLS channel costs an additional approx. 405 KB 49
  • 45. Conclusion • vtTLS is a protocol for diverse and redundant vulnerability-tolerant secure communication channels • Provides an interesting trade-off for a set of critical security applications • Viable for non-timely critical applications 50
  • 46. Future Work • Optimize handshake, reuse sessions • Use more mechanisms when available – SHA-3 and Camellia • Introduce diversity of implementations • Compare vtTLS with TLS-over-TLS tunneling 51
  • 47. 52 Thank you! Miguel.Pardal@tecnico.ulisboa.pt http://www.safecloud-project.eu/ This work was supported by the European Commission through project H2020-653884 (SafeCloud) and by national funds through Fundação para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013 (INESC-ID) Slide contributions: André Joaquim, Ricardo Moura, Sree Harsha Totakura