Recover A RSA Private key from a TLS session with perfect forward secrecyPriyanka Aash
They always taught us that the only thing that can be pulled out from a SSL/TLS session using strong authentication and latest Perferct Forward Secrecy ciphersuites is the public key of the certificate exchanged during the handshake - an insufficient condition to place a MiTM attack without to generate alarms on the validity of the TLS connection and certificate itself. Anyway, this is not always true. In certain circumstances it is possible to derive the private key of server regardless of the size of the used modulus. Even RSA keys of 4096 bits can be factored at the cost of a few CPU cycles and computational resources. All that needed is the generation of a faulty digital signature from server, an event that can be observed when occurring certain conditions such as CPU overheating, RAM errors or other hardware faults. Because of these premises, devices like firewall, switch, router and other embedded appliances are more exposed than traditional IT servers or clients. During the talk, the author will explain the theory behind the attack, how common the factors are that make it possible and his custom pratical implementation of the technique. At the end, a proof-of-concept, able to work both in passive mode (i.e. only by sniffing the network traffic) and in active mode (namely, by participating directly in the establishment of TLS handshakes), will be released.
(Source: Black Hat USA 2016, Las Vegas)
Recover A RSA Private key from a TLS session with perfect forward secrecyPriyanka Aash
They always taught us that the only thing that can be pulled out from a SSL/TLS session using strong authentication and latest Perferct Forward Secrecy ciphersuites is the public key of the certificate exchanged during the handshake - an insufficient condition to place a MiTM attack without to generate alarms on the validity of the TLS connection and certificate itself. Anyway, this is not always true. In certain circumstances it is possible to derive the private key of server regardless of the size of the used modulus. Even RSA keys of 4096 bits can be factored at the cost of a few CPU cycles and computational resources. All that needed is the generation of a faulty digital signature from server, an event that can be observed when occurring certain conditions such as CPU overheating, RAM errors or other hardware faults. Because of these premises, devices like firewall, switch, router and other embedded appliances are more exposed than traditional IT servers or clients. During the talk, the author will explain the theory behind the attack, how common the factors are that make it possible and his custom pratical implementation of the technique. At the end, a proof-of-concept, able to work both in passive mode (i.e. only by sniffing the network traffic) and in active mode (namely, by participating directly in the establishment of TLS handshakes), will be released.
(Source: Black Hat USA 2016, Las Vegas)
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionMd. Ariful Hoque
An efficient implementation of RSA algorithm for speech data encryption and decryption. At first, five hundred Bangla speech words were recorded from six different speaker and stored as RIFF (.wav) file format. Then our developed program was used to extract data from these words and this data were stored in a text file as integer data. Finally, we used our implemented program to encrypt and decrypt speech data.
Strong cryptography is the usage of systems or components that are considered highly resistant to cryptanalysis, the study of methods to cracking the codes. In this talk I would like to present the usage of strong cryptography in PHP. Security is a very important aspect of web applications especially when they manipulate data like passwords, credit card numbers, or sensitive data (as health, financial activities, sexual behavior or sexual orientation, social security numbers, etc). In particular I will present the extensions mcrypt, Hash, and OpenSSL that are been improved in the last version of PHP. These are the slides presented during my talk at PHP Dutch Conference 2011.
The Security library in VisualWorks went through sweeping changes recently. Main change is replacing native smalltalk implementations of various cryptographic algorithms with pluggable interfaces to external libraries, but also a complete rewrite of the SSL implementation to support all current versions of the protocol (SSL3.0 & TLS 1.0, 1.1 and 1.2). Introducing dependencies on external libraries can complicate deployment, however the resulting pluggability of implementation and perfomance boost we're getting in exchange should more then pay off in terms of widening the scope of potential applications, where the purely native implementation was simply not acceptable. In this talk we will survey these changes and discuss their impact and backward compatibility implications.
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
Implementation of RSA Algorithm for Speech Data Encryption and DecryptionMd. Ariful Hoque
An efficient implementation of RSA algorithm for speech data encryption and decryption. At first, five hundred Bangla speech words were recorded from six different speaker and stored as RIFF (.wav) file format. Then our developed program was used to extract data from these words and this data were stored in a text file as integer data. Finally, we used our implemented program to encrypt and decrypt speech data.
Strong cryptography is the usage of systems or components that are considered highly resistant to cryptanalysis, the study of methods to cracking the codes. In this talk I would like to present the usage of strong cryptography in PHP. Security is a very important aspect of web applications especially when they manipulate data like passwords, credit card numbers, or sensitive data (as health, financial activities, sexual behavior or sexual orientation, social security numbers, etc). In particular I will present the extensions mcrypt, Hash, and OpenSSL that are been improved in the last version of PHP. These are the slides presented during my talk at PHP Dutch Conference 2011.
The Security library in VisualWorks went through sweeping changes recently. Main change is replacing native smalltalk implementations of various cryptographic algorithms with pluggable interfaces to external libraries, but also a complete rewrite of the SSL implementation to support all current versions of the protocol (SSL3.0 & TLS 1.0, 1.1 and 1.2). Introducing dependencies on external libraries can complicate deployment, however the resulting pluggability of implementation and perfomance boost we're getting in exchange should more then pay off in terms of widening the scope of potential applications, where the purely native implementation was simply not acceptable. In this talk we will survey these changes and discuss their impact and backward compatibility implications.
Overview on Cryptography and Network SecurityDr. Rupa Ch
These slides give some overview on the the concepts which were in Crytography and network security. I have prepared these slides by the experiece after refer the text bbok as well as resources from the net. Added figures directly from the references. I would like to acknowledge all the authors by originally.
Cryptography and network security Nit701Amit Pathak
Cryptography and network security descries the security parameter with the help of public and private key. Digital signature is one of the most important area which we apply in our daily life for transferring the data.
Today in modern era of internet we share some sensitive data to information transmission. but need to ensure security. So we focus on Cryptography modern technique for secure transmission of information over network.
Modern block ciphers are widely used to provide encryption of quantities of information, and/or a cryptographic checksum to ensure the contents have not been altered. We continue to use block ciphers because they are comparatively fast, and because we know a fair amount about how to design them.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
9. Encryption
• Plaintext: This is what you want to encrypt
• Ciphertext: The encrypted output
• Enciphering or encryption: process which
converts plaintext to ciphertext
• Encryption algorithm: Sequence processing
steps to transform plaintext into ciphertext
• Secret key: Sets some or all parameters used
by encryption algorithm
9
10. Practice (transposition)
Caesar Cipher
Ciphertext: DUH BRX UHDGB
Solution:
c = E(k, p) = (p + k) mod 26
c = E(3, p) = (p + 3) mod 26 for k=key=3
4 mod 26 = 4 so A=D
p = D(k, c) = (c − k) mod 26
D=4 (4-3) mod 26 = 1
10
11. Practice (substitution)
Monoalphabetic cipher
• plaintext letters: a b c d e f .....
• substitution letters: t h i j a b .....
Key is sequence of substitution letters
26 ! = 4.03291461 × 1026
Impossible to crack? No….
Polyalphabetic tougher…
11
12. ETAOIN SHRDLU (Frequency analysis)
• ‘E’ is the most common letter in the English
language,
• ‘Th’ is the most common bigram
• ‘The’ most common trigram
• Letter frequency English
12
14. Polyalphabetic Ciphers
• The Vigenère cipher
• First letter use key 1
• Second uses key 2
• Third uses key 3
To Decrypt go backwards
14
15. Modern Cryptography
Data Encryption Standard (DES) 1976
• 64 bit key (uses 56bits)
• 16 stages
• Block divided into two 32-bit halves
• XOR
• Subkeys made key schedule
15
16. Modern Cryptography
Feistel function:
1. Expansion- the 32-bit half-block is expanded
to 48 bits by duplicating half of the bits
2. Key mixing — the result is combined with a
subkey using an XOR operation.
3. Substitution —block divided into eight 6-bit
pieces then uses substitution boxes
4. Permutation
16
17. Modern Cryptography
Advanced Encryption Standard (AES) 2001
• Substitution-permutation network
• Not Feistel
• Fixed block size 128 bits
• Key size of 128, 192, or 256 bits
17
19. Public-key cryptography
RSA- Ron Rivest, Adi Shamir, Leonard Adleman 1978
• Uses factoring problem (large primes)
• Two large primes of similar size > 100 digits
Example:
Public (n = 3233, e = 17)
Private key is (n = 3233, d = 2753)
n=p1*p2,
e=coprime number to (p1-1)(p2-1)
d =modular multiplicative inverse of e 19
20. Public-key cryptography
Encryption Decryption
c = me (mod n) m = cd (mod n)
Example:
To encrypt m = 65
c = 6517 (mod 3233) = 2790
To decrypt c = 2790, we calculate
m = 27902753 (mod 3233) = 65
20
21. Secure Communication
• AES 256 bit key
• 15360-bit RSA keys are equivalent 256-bit
symmetric keys
• 2^256 = 1.15792089 × 1077 brute-force?
Use RSA then AES for secure communication
HTTPS, SSH, SFTP, SSL and TLS and others
21
22. Some Tools of the trade
File Encryption
• Axantum
• WinZip
Disk encryption
• TrueCrypt
Network
• Open SSH
22