33
The devil is in the details how NOT to do security implementation 05/06/2013 - Università degli Studi di Bergamo Enrico Bacis

The devil is in the (implementation) details

Embed Size (px)

DESCRIPTION

Let's see how simple implementation problems in cryptosystems can lead to severe issues and full plaintext recovery even using strong algorithms like RSA. Presented @ Università degli Studi di Bergamo (Italy) on 05/06/2013 during the Security of Systems class taught by Prof. Stefano Paraboschi. [Warning: the presentation is not meant to be studied but to provide the presenter a visual canvas that needs to be filled with her words]

Citation preview

Page 1: The devil is in the (implementation) details

The devil is in thedetails

how NOT to do security

implementation

05/06/2013 - Università degli Studi di Bergamo Enrico Bacis

Page 2: The devil is in the (implementation) details

Side Channel Attacks

Page 3: The devil is in the (implementation) details

A parity problem

Page 4: The devil is in the (implementation) details
Page 5: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

n = 15 (p = 3, q = 5)

Page 11: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

enc(4·m)

err

Page 13: The devil is in the (implementation) details

0 1 2 3 4 5 6 7 8 9 10 11 12 13 14

enc(8·m)

ok

Page 15: The devil is in the (implementation) details

Multiplicative Property of RSA

Page 16: The devil is in the (implementation) details

Can we only hack farms?

Page 17: The devil is in the (implementation) details

PKCS#1 v1.5

0002 RANDOM PAD 00 MESSAGE

Broken by Bleichenbacher Attack (1998)

Page 18: The devil is in the (implementation) details

Electronic Codebook

Page 19: The devil is in the (implementation) details

ECB CBC

Page 20: The devil is in the (implementation) details

Cipher Block Chaining

Page 21: The devil is in the (implementation) details
Page 22: The devil is in the (implementation) details

Padding Oracle Attack

Page 23: The devil is in the (implementation) details
Page 24: The devil is in the (implementation) details

Timing Attack

Page 25: The devil is in the (implementation) details
Page 26: The devil is in the (implementation) details

"Never ever implementyour own cryptosystem"

( Dan Boneh )

Page 27: The devil is in the (implementation) details

Android and Mobile Vulnerabilities

Page 28: The devil is in the (implementation) details

Sniffing

Page 29: The devil is in the (implementation) details

Man In The Middle Attack

Page 30: The devil is in the (implementation) details

Man In The Middle Attack

Page 31: The devil is in the (implementation) details

Why Eve and Mallory Love Android

1074 of 13500 (8%) apps

● Trusting all Certicates● Allowing all Hostnames

39.5 to 185 million users

SSL/TLS issues

Page 32: The devil is in the (implementation) details
Page 33: The devil is in the (implementation) details

Thank you