the devil is in the (implementation) details

33
The devil is in the details how NOT to do security implementation 05/06/2013 - Università degli Studi di Bergamo Enrico Bacis

Upload: enrico-bacis

Post on 08-Jun-2015

132 views

Category:

Technology


4 download

DESCRIPTION

Let's see how simple implementation problems in cryptosystems can lead to severe issues and full plaintext recovery even using strong algorithms like RSA. Presented @ Università degli Studi di Bergamo (Italy) on 05/06/2013 during the Security of Systems class taught by Prof. Stefano Paraboschi. [Warning: the presentation is not meant to be studied but to provide the presenter a visual canvas that needs to be filled with her words]

TRANSCRIPT

Page 1: The devil is in the (implementation) details

The devil is in thedetails

how NOT to do security

implementation

05/06/2013 - Università degli Studi di Bergamo Enrico Bacis

Page 2: The devil is in the (implementation) details

Side Channel Attacks

Page 3: The devil is in the (implementation) details

A parity problem

Page 4: The devil is in the (implementation) details
Page 5: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

n = 15 (p = 3, q = 5)

Page 11: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

enc(4·m)

err

Page 13: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

enc(8·m)

ok

Page 15: The devil is in the (implementation) details

Multiplicative Property of RSA

Page 16: The devil is in the (implementation) details

Can we only hack farms?

Page 17: The devil is in the (implementation) details

PKCS#1 v1.5

0002 RANDOM PAD 00 MESSAGE

Broken by Bleichenbacher Attack (1998)

Page 18: The devil is in the (implementation) details

Electronic Codebook

Page 19: The devil is in the (implementation) details

ECB CBC

Page 20: The devil is in the (implementation) details

Cipher Block Chaining

Page 21: The devil is in the (implementation) details
Page 22: The devil is in the (implementation) details

Padding Oracle Attack

Page 23: The devil is in the (implementation) details
Page 24: The devil is in the (implementation) details

Timing Attack

Page 25: The devil is in the (implementation) details
Page 26: The devil is in the (implementation) details

"Never ever implementyour own cryptosystem"

( Dan Boneh )

Page 27: The devil is in the (implementation) details

Android and Mobile Vulnerabilities

Page 28: The devil is in the (implementation) details

Sniffing

Page 29: The devil is in the (implementation) details

Man In The Middle Attack

Page 30: The devil is in the (implementation) details

Man In The Middle Attack

Page 31: The devil is in the (implementation) details

Why Eve and Mallory Love Android

1074 of 13500 (8%) apps

● Trusting all Certicates● Allowing all Hostnames

39.5 to 185 million users

SSL/TLS issues

Page 32: The devil is in the (implementation) details
Page 33: The devil is in the (implementation) details

Thank you