SlideShare a Scribd company logo
Trupti Shiralkar
Common Crypto Attacks and
Secure Implementations
Guidelines
Disclaimer
This disclaimer informs readers that the views, thoughts, and opinions expressed in the presentation
belong solely to the author, and not necessarily to the author’s employer, organization, committee or other
group or individual.
All the images used in this presentation do not belong to me and are subject to copyright protection act.
Agenda
• Why should we study common crypto attacks?
• Common Crypto Attacks
o Vulnerabilities in cryptographic ciphers and protocol
o Vulnerabilities in cryptographic Libraries
• FIPS 140-2: what works/ doesn’t work?
• Secure Implementation Guidelines
• Conclusion
Why Should We Study
Crypto Attacks
Building a secure cryptographic system is easy to do so badly and
very difficult to do well. Unfortunately, most people can’t tell the
difference.
~ Bruce Schniner
Fighting Russians in Winter
• 35,000 troops
reduced to 19,000
• Swedish empire
ended in 1709
Swedish Invasion
(1707)
• 610,000 troops
reduced to 120,000
• Napoleon’s defeat
French Invasion
(1812)
• Lessons learnt from
the history were
ignored
German Invasion
(1941)
Cryptographic Ciphers
There are two types of encryption: One that will prevent your sister
from reading your diary and one that will prevent your government.
- Bruce Schneier
Cryptographic Ciphers
Insecure vs secure cipher
• Any cipher which provides 128 bits + of cryptographic strength is considered safe before quantum computing becomes norm
Examples: AES (128, 192, 256 bits)
• NSA Suit B Cryptography for classified and unclassified information
Ăź AES (128,256) for symmetric encryption with counter mode for low bandwidth/GCM mode for high bandwidth
Ăź ECDSA for digital signature
Ăź ECDH for key agreement
Ăź SHA-256 or SHA-384 for message digest
• Insecure ciphers
☀ MD5, SHA-1,
☀ DES, TDES
☀ RSA, DSA with 1024 bits key pair
☀ RC4
• Quantum Safe ciphers
Ciphers which are safe against attack by a quantum computer.
AWS crypto quantum safe ciphers wiki
Cryptographic Attacks & Vulnerabilities Chronology
• DES was broken using deep crack (IBM 1997)
• ROBOT (1998-2017)
• EC DRBG Backdoor (2007-2013)
• Lucky 13 (2013)
• BEAST (2013)
• POODLE (2014)
• HeartBleed (2014)
• Logjam (2015)
• FREAK (2015)
• DROWN (2016)
Cryptographic Backdoor
• RNG Backdoor is implemented in FIPS approved
Dual EC DRBG which was identified by Microsoft
Engineers in 2007.
• NSA runs BULLRUN program to crack encrypted
online data
• NSA paid $10 million to RSA to put backdoor in
BESAFE library
• NSA spent $250 million per year to insert this
backdoor in software and hardware products.
• In 2013, NY Times article indicated presence of
backdoor
• NIST SP 800-90A was published in 2006 and
withdrawn in 2014.
Padding Oracle Attack
• In cryptography plaintext is padded to be
compatible with cryptographic primitives.
• Oracle is usually a server that responds
whether the message is correctly padded or
not.
• This attack uses padding validation of
cryptographic message to decrypt ciphertext.
• CBC mode provides only confidentiality.
• In case of CBC mode based encryption, the
servers returns a message weather padding of
encrypted text is correct or not resulting in
decryption of ciphertext without encryption
key.
• Examples: Lucky 13, FREAK, POODLE, Logjam
ROBOT (Return Of Bleichenbacher’s Oracle Threat) CVE-2017-13099
• 20 years old crypto vulnerability (identified in 1998)
• Researchers built proof of concept scanned
infrastructure and found facebook, F5, Cisco,
BouncyCastle, WolfSSL and few more vendors
vulnerable.
• This attack is applicable to RSA key exchange
(TLS_RSA_WITH_AES_128_CBC_SHA)
• Root Cause: The error messages in the RSA
encryption standard PKCS#1v1.5 padding scheme
allows adaptive chosen cipher text attack.
• Impact: attacker can decrypt encrypted data and
sign communications using the sites’ private key
resulting in information disclosure.
• Resolution: Do not use PKCS#1v1.5.
• TLS v 1.3 has decided deprecate the use of RSA key
exchange PKCS #1v 1.5
LUCKY 13 (CVE-2013-0169)
• This is a timing attack which is basically a side
channel attack. Attacker analyzes time takes
to execute the cipher operations.
• Root cause: Attacker exploits badly formatted
padding in TLS cipher that uses CBC mode
• Impact: Attacker can obtain plaintext
authentication cookies.
• Martin R. Albrecht and Paterson
demonstrated variant of Lucky 13 attack on
Amazon s2n and fount it vulnerable.
• Resolution: Add random time delays to beat
statistical analysis, use authenticated
encryption AES-GCM/CCM
BEAST Browser Exploit Against SSL/TLS (CVE-2011-3389)
• BEAST is an attack which was revealed in September
2011
• This is a purely client side vulnerability.
• Root cause: weakness in CBC mode, except the first
random string of IV used for encryption, rest all IVs are
predictable during active man in the middle attack
causing chosen plaintext vulnerability in TLS/SSL.
• Impact: According to Gregory Bard’s paper, the
success rate of this attack is 100%.
• Resolution: use explicit IV, AES-GCM in TLS 1.2
POODLE(Padding Oracle On Downgraded Legacy Encryption) CVE-2014-3566
• Root Cause: For backward compatibility, many
legacy server support downgrading request to
SSL v3 which uses insecure RC4 or CBC mode
• Impact: Attacker uses Man-In-the-Middle
attack to downgrade protocol to SSV3
• Secret encrypted with RC4 and sent many
times, it leaks more and more information
with bit flipping attack.
• 256 SSL v3 requests are required to obtain1
byte of plain text data.
• Resolution: Disable SSL v3 or use
TLS_FALLBACK_SCSV which ensures that
legacy system is involved
HeartBleed (CVE-2014-0160)
• January 1, 2011 German developer introduced Heartbeat
extension to OpenSSL.
• This TLS extension implements keep-alive functionality
without performing a renegotiation.
• This flaw was discovered by Codenomicon + Google security
engineers in April,2014.
• Root cause: Buffer over read vulnerability which lacks bound
checking, reads more data than the size of buffer causing
memory safety issues.
• Impact: Attacker can read sensitive information including
private keys from 64 MB memory, decrypt server traffic and
impersonate server.
• Resolution: upgrade OpenSSL library to OpenSSL v1.0.1g.
LOGJAM( CVE-2015-4000)
• Root Cause: Logjam exploits the TLS protocol flaw of
supporting export grade Diffie- Helman (512 bit)
• Impact: TLS connection is downgraded to export level
Diffie-Hellman using man-in-the-middle attack
• Resolution: Reject small primes in DHE handshake,
accept 2048 bits or lager DHE group, transition to
ECDH.
FREAK (Factoring Attack on RSA Export Keys) CVE-2015-0204
• Root cause: Attacker can conduct Man-in-the-Middle attack to
force clients to use weaker encryption (RSA 512 bit) which is
easy to decrypt.
• Weak RSA Export options:
TLS_RSA_EXPORT_WITH_DES40_CBC_SHA
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA
• Impact: Attacker can decrypt cipher text.
• Resolution: disable export grade cipher suite.
DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) CVE-2016-0800
• Breaking TLS using SSLv2: Published in August
2016
• According to https://drownattack.com , 33%
HTTPS servers were affected.
• Root cause: Attacker exploits fundamental flaw in
SSL v2 which utilizes 40 bits RSA key material.
• Impact: 40,000 probes and 2^50 computations
are required to decrypt 1/900 TLS connections
from victim. Amazon EC2 computation cost for is
$440
• In case of OpenSSL bug, 17,000 probes are
required to decrypt 1/260 TLS connections from
victim. It will take less than one min on a fast PC
to decrypt the key.
• Resolution: upgrade OpenSSL library and do not
use SSLv2
Vulnerabilities in
Cryptographic Libraries
S
Strong cryptography is very powerful when it is done right, but it is not a panacea.
Focusing on cryptographic algorithms while ignoring other aspects of security is like
defending your house not by building a fence around it, but by putting an immense
stake in the ground and hoping that your adversary runs right into it.
~ Bruce Schneier
OpenSSL Vulnerability Trend
OpenSSL Vulnerability Categorization
OpenSSL Vulnerability Categorization
Bouncy Castle Vulnerabilities
Known vulnerabilities
1. ROBOT (CVE-2017-13098)
2. Invalid curve attack (CVE-2015-7940)
~ Bouncy Castle does not validate EC point curve and attacker can send several
specially crafted ECDH key exchange request to obtain private key.
3. Timing Side Channel Attack (CVE-2013-1624)
~ During processing of malformed CBC padding, timing attack on MAC validation
operation results in plaintext recovery.
4. Bleichenbacher vulnerability (ROBOT) (CVE-2007-6721)
Lessons Learnt from FIPS 140-2
• Finite State Model crypto libraries
• Self Test
- known answer test for each cipher
• Conditional tests
- pairwise consistency test
• Key Generation Entropy
• Random number conditional tests
- stuck bit test
• Key Zerorization
- Securely delete keys after usage by overwriting it with
zeros or random data.
• Tamper Resistance
Tamper detection, Tamper Evidence and Tamper Response
Entropy
• Longer key does not guarantee more security
• What is entropy?
• How to measure entropy?
• Tools : NIST’s Statistical test suite, Dieharder
https://w.amazon.com/index.php/Infosec/Cryptography/Guidelines/Dieharder
• Best security practices
Ø Ensure all sources of entropy are secure
ØThe entropy of the key should be equivalent to the cryptographic strength indicated by the key size
o AES 256 bits (cryptographic strength: 256 bits)
o RSA 2048 bits (cryptographic strength: 128 bits)
Why FIPS 140-2 doesn’t guarantee security?
• Cipher suite recommendations including key size, modes are dictated
by NIST (or NSA ?)
• Application security or full stack (end to end) issues are not captured
• Scope of crypto review is limited to boundary of the library
• Crypto requirements do not change as technology changes
• Paper Chase: Too much emphasis on documentation
• Time required for certification is more that the life of version of
crypto product /service
Secure implementation
Guidelines
Prussian general Carl von Clausewitz calls "the position of the interior." A good
security product must defend against every possible attack, even attacks that
haven't been invented yet.
~ Bruce Schniner
Secure cryptographic implementation guidelines
• Do not reuse cryptographic parameters (key, IV, key material)
• Check the size of input parameters to avoid buffer overflows.
• Destroy all copies (temporary files, virtual memory)of plaintext after it is encrypted.
• Erase key material properly after usage
• Do not leave keys and password on host and rely on OS to protect it.
• Audit flooding should be prohibited to avoid hiding attacker’s identity
• Ensure the protection of compromised keys stored as hot list
• Selection of weak password in Password Base Key Derivation Function(PBKDF) ( Password less than size
10 could result as a weak protection for resulting AES-256 bit key)
• Along with encryption, ensure the integrity and authenticity of the data.
Summary
Buckets of crypto Vulnerabilities:
• Lack of security control
• Insecure configuration
• Insufficient entropy/randomness
• Implementation bugs
• Mathematical flaws
• Design flaws
• 1990s era export grade cryptography
Conclusion
• Weaker encryption (1990s era US export) is baked in many software products which is root cause of
many crypto vulnerabilities.
• A strong and secure cryptographic keys do not guarantee a secure cryptosystem.
• Security builders should be aware of cryptanalytic attacks so that old mistakes are not repeated over
and over again.
• Security control developers and cryptographers should work together efficiently.
• Discuss the gravity of consequences of a security trade off to enhance usability with cryptographers.
References
• https://w.amazon.com/index.php/AWSCryptoBR/Cryptosystems
• http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf
• https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf
• https://eprint.iacr.org/2017/1189.pdf
• http://www.cs.umd.edu/~jkatz/security/downloads/padding-oracle-attacks.pdf
• http://kodu.ut.ee/~mroos/turve/2015/referaadid/Rodion_Krjutskov.pdf
• https://www.openssl.org/~bodo/ssl-poodle.pdf
• https://drownattack.com/drown-attack-paper.pdf
Question?
Contact: tshiralk@amazon.com

More Related Content

What's hot

BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat Security Conference
 
Ch 6: Attacking Authentication
Ch 6: Attacking AuthenticationCh 6: Attacking Authentication
Ch 6: Attacking Authentication
Sam Bowne
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
Tim Mackey
 
Heartbleed && Wireless
Heartbleed && WirelessHeartbleed && Wireless
Heartbleed && Wireless
Luis Grangeia
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
NCCOMMS
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
Tim Mackey
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Malware for Red Team
Malware for Red TeamMalware for Red Team
Malware for Red Team
Satria Ady Pradana
 
Anatomy of a Cloud Hack
Anatomy of a Cloud HackAnatomy of a Cloud Hack
Anatomy of a Cloud Hack
NotSoSecure Global Services
 
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
Csw2016 chaykin having_funwithsecuremessengers_and_androidwearCsw2016 chaykin having_funwithsecuremessengers_and_androidwear
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
CanSecWest
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
Qrator Labs
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
NCC Group
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
Flaskdata.io
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
AllanGray11
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
Black Duck by Synopsys
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
Arash Ramez
 
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
FRSecure
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
FRSecure
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
Arash Ramez
 
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
Cisco DevNet
 

What's hot (20)

BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
BlueHat v18 || Tales from the soc - real-world attacks seen through azure atp...
 
Ch 6: Attacking Authentication
Ch 6: Attacking AuthenticationCh 6: Attacking Authentication
Ch 6: Attacking Authentication
 
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous DeliverySecure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
 
Heartbleed && Wireless
Heartbleed && WirelessHeartbleed && Wireless
Heartbleed && Wireless
 
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-MelhaouiCSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
CSF18 - Implementing Gartners #1 - Whitelisting- Karim El-Melhaoui
 
Secure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStackSecure application deployment in Apache CloudStack
Secure application deployment in Apache CloudStack
 
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 8 – FRSecure CISSP Mentor Program 2017
 
Malware for Red Team
Malware for Red TeamMalware for Red Team
Malware for Red Team
 
Anatomy of a Cloud Hack
Anatomy of a Cloud HackAnatomy of a Cloud Hack
Anatomy of a Cloud Hack
 
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
Csw2016 chaykin having_funwithsecuremessengers_and_androidwearCsw2016 chaykin having_funwithsecuremessengers_and_androidwear
Csw2016 chaykin having_funwithsecuremessengers_and_androidwear
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Real World Application Threat Modelling By Example
Real World Application Threat Modelling By ExampleReal World Application Threat Modelling By Example
Real World Application Threat Modelling By Example
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Continuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash BaraiContinuous Automated Red Teaming (CART) - Bikash Barai
Continuous Automated Red Teaming (CART) - Bikash Barai
 
Security in the Age of Open Source
Security in the Age of Open SourceSecurity in the Age of Open Source
Security in the Age of Open Source
 
Certificate pinning in android applications
Certificate pinning in android applicationsCertificate pinning in android applications
Certificate pinning in android applications
 
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 7 – FRSecure CISSP Mentor Program 2017
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
How to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part TwoHow to do Cryptography right in Android Part Two
How to do Cryptography right in Android Part Two
 
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190	Targeted Threat (APT) Defense for Hosted ApplicationsDEVNET-1190	Targeted Threat (APT) Defense for Hosted Applications
DEVNET-1190 Targeted Threat (APT) Defense for Hosted Applications
 

Similar to Common crypto attacks and secure implementations

SSL overview
SSL overviewSSL overview
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Gabriella Davis
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
UC San Diego
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
Md. Hasan Basri (Angel)
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
Nitin Ramesh
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
CAS
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
Inderjeet Singh
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
OWASP
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
jithu26327
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
Sophos Benelux
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
Dr. Shivashankar
 
Basics of ssl
Basics of sslBasics of ssl
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
Jerome Smith
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
Rizky Ariestiyansyah
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
Briskinfosec Technology and Consulting
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
Vi TĂ­nh HoĂ ng Nam
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
Nisheed KM
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
Toni de la Fuente
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
OwaspCzech
 

Similar to Common crypto attacks and secure implementations (20)

SSL overview
SSL overviewSSL overview
SSL overview
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
 
Workshop on Network Security
Workshop on Network SecurityWorkshop on Network Security
Workshop on Network Security
 
Information Security Engineering
Information Security EngineeringInformation Security Engineering
Information Security Engineering
 
TLS/SSL - Study of Secured Communications
TLS/SSL - Study of Secured  CommunicationsTLS/SSL - Study of Secured  Communications
TLS/SSL - Study of Secured Communications
 
Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...Improved authentication & key agreement protocol using elliptic curve cryptog...
Improved authentication & key agreement protocol using elliptic curve cryptog...
 
Ransomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your DataRansomware- What you need to know to Safeguard your Data
Ransomware- What you need to know to Safeguard your Data
 
[Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things![Wroclaw #8] TLS all the things!
[Wroclaw #8] TLS all the things!
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
How to stay protected against ransomware
How to stay protected against ransomwareHow to stay protected against ransomware
How to stay protected against ransomware
 
Network Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr ShivashankarNetwork Security_Module_2_Dr Shivashankar
Network Security_Module_2_Dr Shivashankar
 
Basics of ssl
Basics of sslBasics of ssl
Basics of ssl
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Comprehensive Guide On Network Security
Comprehensive Guide On Network SecurityComprehensive Guide On Network Security
Comprehensive Guide On Network Security
 
Ceh v5 module 05 system hacking
Ceh v5 module 05 system hackingCeh v5 module 05 system hacking
Ceh v5 module 05 system hacking
 
Go paranoid
Go paranoidGo paranoid
Go paranoid
 
Alfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transitAlfresco DevCon 2019: Encryption at-rest and in-transit
Alfresco DevCon 2019: Encryption at-rest and in-transit
 
Crypto failures every developer should avoid
Crypto failures every developer should avoidCrypto failures every developer should avoid
Crypto failures every developer should avoid
 

More from Trupti Shiralkar, CISSP

Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
Trupti Shiralkar, CISSP
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Trupti Shiralkar, CISSP
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
Trupti Shiralkar, CISSP
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Trupti Shiralkar, CISSP
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
Trupti Shiralkar, CISSP
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
Trupti Shiralkar, CISSP
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
Trupti Shiralkar, CISSP
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
Trupti Shiralkar, CISSP
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
Trupti Shiralkar, CISSP
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
Trupti Shiralkar, CISSP
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
Trupti Shiralkar, CISSP
 

More from Trupti Shiralkar, CISSP (12)

Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
Gratitude Ignites, Growth Fortifies: Building an unbreakable cyber security V...
 
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
IKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptxIKIGAI for security professionals B sides Seattle.pptx
IKIGAI for security professionals B sides Seattle.pptx
 
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdfTru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
Tru_Shiralkar_Gen AI Sec_ ISACA 2024.pdf
 
Self-care, breathing exercises, meditation
Self-care, breathing exercises, meditationSelf-care, breathing exercises, meditation
Self-care, breathing exercises, meditation
 
Cloud Security Trends.pdf
Cloud Security Trends.pdfCloud Security Trends.pdf
Cloud Security Trends.pdf
 
Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0Protecting microservices using secure design patterns 1.0
Protecting microservices using secure design patterns 1.0
 
Secure coding-guidelines
Secure coding-guidelinesSecure coding-guidelines
Secure coding-guidelines
 
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
The Road Less Traveled: Use-cases, Challenges, and Solutions of Homomorphic E...
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 
Purple team strategy_lascon_2016
Purple team strategy_lascon_2016Purple team strategy_lascon_2016
Purple team strategy_lascon_2016
 
Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2Security evaluation of_libraries_lascon_2017_v2
Security evaluation of_libraries_lascon_2017_v2
 

Recently uploaded

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
QuickwayInfoSystems3
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
Donna Lenk
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Globus
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 

Recently uploaded (20)

AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
Enterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptxEnterprise Software Development with No Code Solutions.pptx
Enterprise Software Development with No Code Solutions.pptx
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"Navigating the Metaverse: A Journey into Virtual Evolution"
Navigating the Metaverse: A Journey into Virtual Evolution"
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisProviding Globus Services to Users of JASMIN for Environmental Data Analysis
Providing Globus Services to Users of JASMIN for Environmental Data Analysis
 
Enhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdfEnhancing Research Orchestration Capabilities at ORNL.pdf
Enhancing Research Orchestration Capabilities at ORNL.pdf
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 

Common crypto attacks and secure implementations

  • 1. Trupti Shiralkar Common Crypto Attacks and Secure Implementations Guidelines
  • 2. Disclaimer This disclaimer informs readers that the views, thoughts, and opinions expressed in the presentation belong solely to the author, and not necessarily to the author’s employer, organization, committee or other group or individual. All the images used in this presentation do not belong to me and are subject to copyright protection act.
  • 3. Agenda • Why should we study common crypto attacks? • Common Crypto Attacks o Vulnerabilities in cryptographic ciphers and protocol o Vulnerabilities in cryptographic Libraries • FIPS 140-2: what works/ doesn’t work? • Secure Implementation Guidelines • Conclusion
  • 4. Why Should We Study Crypto Attacks Building a secure cryptographic system is easy to do so badly and very difficult to do well. Unfortunately, most people can’t tell the difference. ~ Bruce Schniner
  • 5. Fighting Russians in Winter • 35,000 troops reduced to 19,000 • Swedish empire ended in 1709 Swedish Invasion (1707) • 610,000 troops reduced to 120,000 • Napoleon’s defeat French Invasion (1812) • Lessons learnt from the history were ignored German Invasion (1941)
  • 6. Cryptographic Ciphers There are two types of encryption: One that will prevent your sister from reading your diary and one that will prevent your government. - Bruce Schneier
  • 7. Cryptographic Ciphers Insecure vs secure cipher • Any cipher which provides 128 bits + of cryptographic strength is considered safe before quantum computing becomes norm Examples: AES (128, 192, 256 bits) • NSA Suit B Cryptography for classified and unclassified information Ăź AES (128,256) for symmetric encryption with counter mode for low bandwidth/GCM mode for high bandwidth Ăź ECDSA for digital signature Ăź ECDH for key agreement Ăź SHA-256 or SHA-384 for message digest • Insecure ciphers ☀ MD5, SHA-1, ☀ DES, TDES ☀ RSA, DSA with 1024 bits key pair ☀ RC4 • Quantum Safe ciphers Ciphers which are safe against attack by a quantum computer. AWS crypto quantum safe ciphers wiki
  • 8. Cryptographic Attacks & Vulnerabilities Chronology • DES was broken using deep crack (IBM 1997) • ROBOT (1998-2017) • EC DRBG Backdoor (2007-2013) • Lucky 13 (2013) • BEAST (2013) • POODLE (2014) • HeartBleed (2014) • Logjam (2015) • FREAK (2015) • DROWN (2016)
  • 9. Cryptographic Backdoor • RNG Backdoor is implemented in FIPS approved Dual EC DRBG which was identified by Microsoft Engineers in 2007. • NSA runs BULLRUN program to crack encrypted online data • NSA paid $10 million to RSA to put backdoor in BESAFE library • NSA spent $250 million per year to insert this backdoor in software and hardware products. • In 2013, NY Times article indicated presence of backdoor • NIST SP 800-90A was published in 2006 and withdrawn in 2014.
  • 10. Padding Oracle Attack • In cryptography plaintext is padded to be compatible with cryptographic primitives. • Oracle is usually a server that responds whether the message is correctly padded or not. • This attack uses padding validation of cryptographic message to decrypt ciphertext. • CBC mode provides only confidentiality. • In case of CBC mode based encryption, the servers returns a message weather padding of encrypted text is correct or not resulting in decryption of ciphertext without encryption key. • Examples: Lucky 13, FREAK, POODLE, Logjam
  • 11. ROBOT (Return Of Bleichenbacher’s Oracle Threat) CVE-2017-13099 • 20 years old crypto vulnerability (identified in 1998) • Researchers built proof of concept scanned infrastructure and found facebook, F5, Cisco, BouncyCastle, WolfSSL and few more vendors vulnerable. • This attack is applicable to RSA key exchange (TLS_RSA_WITH_AES_128_CBC_SHA) • Root Cause: The error messages in the RSA encryption standard PKCS#1v1.5 padding scheme allows adaptive chosen cipher text attack. • Impact: attacker can decrypt encrypted data and sign communications using the sites’ private key resulting in information disclosure. • Resolution: Do not use PKCS#1v1.5. • TLS v 1.3 has decided deprecate the use of RSA key exchange PKCS #1v 1.5
  • 12. LUCKY 13 (CVE-2013-0169) • This is a timing attack which is basically a side channel attack. Attacker analyzes time takes to execute the cipher operations. • Root cause: Attacker exploits badly formatted padding in TLS cipher that uses CBC mode • Impact: Attacker can obtain plaintext authentication cookies. • Martin R. Albrecht and Paterson demonstrated variant of Lucky 13 attack on Amazon s2n and fount it vulnerable. • Resolution: Add random time delays to beat statistical analysis, use authenticated encryption AES-GCM/CCM
  • 13. BEAST Browser Exploit Against SSL/TLS (CVE-2011-3389) • BEAST is an attack which was revealed in September 2011 • This is a purely client side vulnerability. • Root cause: weakness in CBC mode, except the first random string of IV used for encryption, rest all IVs are predictable during active man in the middle attack causing chosen plaintext vulnerability in TLS/SSL. • Impact: According to Gregory Bard’s paper, the success rate of this attack is 100%. • Resolution: use explicit IV, AES-GCM in TLS 1.2
  • 14. POODLE(Padding Oracle On Downgraded Legacy Encryption) CVE-2014-3566 • Root Cause: For backward compatibility, many legacy server support downgrading request to SSL v3 which uses insecure RC4 or CBC mode • Impact: Attacker uses Man-In-the-Middle attack to downgrade protocol to SSV3 • Secret encrypted with RC4 and sent many times, it leaks more and more information with bit flipping attack. • 256 SSL v3 requests are required to obtain1 byte of plain text data. • Resolution: Disable SSL v3 or use TLS_FALLBACK_SCSV which ensures that legacy system is involved
  • 15. HeartBleed (CVE-2014-0160) • January 1, 2011 German developer introduced Heartbeat extension to OpenSSL. • This TLS extension implements keep-alive functionality without performing a renegotiation. • This flaw was discovered by Codenomicon + Google security engineers in April,2014. • Root cause: Buffer over read vulnerability which lacks bound checking, reads more data than the size of buffer causing memory safety issues. • Impact: Attacker can read sensitive information including private keys from 64 MB memory, decrypt server traffic and impersonate server. • Resolution: upgrade OpenSSL library to OpenSSL v1.0.1g.
  • 16. LOGJAM( CVE-2015-4000) • Root Cause: Logjam exploits the TLS protocol flaw of supporting export grade Diffie- Helman (512 bit) • Impact: TLS connection is downgraded to export level Diffie-Hellman using man-in-the-middle attack • Resolution: Reject small primes in DHE handshake, accept 2048 bits or lager DHE group, transition to ECDH.
  • 17. FREAK (Factoring Attack on RSA Export Keys) CVE-2015-0204 • Root cause: Attacker can conduct Man-in-the-Middle attack to force clients to use weaker encryption (RSA 512 bit) which is easy to decrypt. • Weak RSA Export options: TLS_RSA_EXPORT_WITH_DES40_CBC_SHA TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA • Impact: Attacker can decrypt cipher text. • Resolution: disable export grade cipher suite.
  • 18. DROWN (Decrypting RSA with Obsolete and Weakened eNcryption) CVE-2016-0800 • Breaking TLS using SSLv2: Published in August 2016 • According to https://drownattack.com , 33% HTTPS servers were affected. • Root cause: Attacker exploits fundamental flaw in SSL v2 which utilizes 40 bits RSA key material. • Impact: 40,000 probes and 2^50 computations are required to decrypt 1/900 TLS connections from victim. Amazon EC2 computation cost for is $440 • In case of OpenSSL bug, 17,000 probes are required to decrypt 1/260 TLS connections from victim. It will take less than one min on a fast PC to decrypt the key. • Resolution: upgrade OpenSSL library and do not use SSLv2
  • 19. Vulnerabilities in Cryptographic Libraries S Strong cryptography is very powerful when it is done right, but it is not a panacea. Focusing on cryptographic algorithms while ignoring other aspects of security is like defending your house not by building a fence around it, but by putting an immense stake in the ground and hoping that your adversary runs right into it. ~ Bruce Schneier
  • 23. Bouncy Castle Vulnerabilities Known vulnerabilities 1. ROBOT (CVE-2017-13098) 2. Invalid curve attack (CVE-2015-7940) ~ Bouncy Castle does not validate EC point curve and attacker can send several specially crafted ECDH key exchange request to obtain private key. 3. Timing Side Channel Attack (CVE-2013-1624) ~ During processing of malformed CBC padding, timing attack on MAC validation operation results in plaintext recovery. 4. Bleichenbacher vulnerability (ROBOT) (CVE-2007-6721)
  • 24. Lessons Learnt from FIPS 140-2 • Finite State Model crypto libraries • Self Test - known answer test for each cipher • Conditional tests - pairwise consistency test • Key Generation Entropy • Random number conditional tests - stuck bit test • Key Zerorization - Securely delete keys after usage by overwriting it with zeros or random data. • Tamper Resistance Tamper detection, Tamper Evidence and Tamper Response
  • 25. Entropy • Longer key does not guarantee more security • What is entropy? • How to measure entropy? • Tools : NIST’s Statistical test suite, Dieharder https://w.amazon.com/index.php/Infosec/Cryptography/Guidelines/Dieharder • Best security practices Ø Ensure all sources of entropy are secure ØThe entropy of the key should be equivalent to the cryptographic strength indicated by the key size o AES 256 bits (cryptographic strength: 256 bits) o RSA 2048 bits (cryptographic strength: 128 bits)
  • 26. Why FIPS 140-2 doesn’t guarantee security? • Cipher suite recommendations including key size, modes are dictated by NIST (or NSA ?) • Application security or full stack (end to end) issues are not captured • Scope of crypto review is limited to boundary of the library • Crypto requirements do not change as technology changes • Paper Chase: Too much emphasis on documentation • Time required for certification is more that the life of version of crypto product /service
  • 27. Secure implementation Guidelines Prussian general Carl von Clausewitz calls "the position of the interior." A good security product must defend against every possible attack, even attacks that haven't been invented yet. ~ Bruce Schniner
  • 28. Secure cryptographic implementation guidelines • Do not reuse cryptographic parameters (key, IV, key material) • Check the size of input parameters to avoid buffer overflows. • Destroy all copies (temporary files, virtual memory)of plaintext after it is encrypted. • Erase key material properly after usage • Do not leave keys and password on host and rely on OS to protect it. • Audit flooding should be prohibited to avoid hiding attacker’s identity • Ensure the protection of compromised keys stored as hot list • Selection of weak password in Password Base Key Derivation Function(PBKDF) ( Password less than size 10 could result as a weak protection for resulting AES-256 bit key) • Along with encryption, ensure the integrity and authenticity of the data.
  • 29. Summary Buckets of crypto Vulnerabilities: • Lack of security control • Insecure configuration • Insufficient entropy/randomness • Implementation bugs • Mathematical flaws • Design flaws • 1990s era export grade cryptography
  • 30. Conclusion • Weaker encryption (1990s era US export) is baked in many software products which is root cause of many crypto vulnerabilities. • A strong and secure cryptographic keys do not guarantee a secure cryptosystem. • Security builders should be aware of cryptanalytic attacks so that old mistakes are not repeated over and over again. • Security control developers and cryptographers should work together efficiently. • Discuss the gravity of consequences of a security trade off to enhance usability with cryptographers.
  • 31. References • https://w.amazon.com/index.php/AWSCryptoBR/Cryptosystems • http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf • https://projectbullrun.org/dual-ec/documents/dual-ec-20150731.pdf • https://eprint.iacr.org/2017/1189.pdf • http://www.cs.umd.edu/~jkatz/security/downloads/padding-oracle-attacks.pdf • http://kodu.ut.ee/~mroos/turve/2015/referaadid/Rodion_Krjutskov.pdf • https://www.openssl.org/~bodo/ssl-poodle.pdf • https://drownattack.com/drown-attack-paper.pdf