26 research outputs found
Attacking Deterministic Signature Schemes using Fault Attacks
Many digital signature schemes rely on random numbers that are unique and non-predictable per signature. Failures of random number generators may have catastrophic effects such as compromising private signature keys. In recent years, many widely-used cryptographic technologies adopted deterministic signature schemes because they are presumed to be safer to implement.
In this paper, we analyze the security of deterministic ECDSA and EdDSA signature schemes and show that the elimination of random number generators in these schemes enables new kinds of fault attacks. We formalize these attacks and introduce practical attack scenarios against EdDSA using the Rowhammer fault attack. EdDSA is used in many widely used protocols such as TLS, SSH and IPSec, and we show that these protocols are not vulnerable to our attack. We formalize the necessary requirements of protocols using these deterministic signature schemes to be vulnerable, and discuss mitigation strategies and their effect on fault attacks against deterministic signature schemes
"I don't know why I check this…" Investigating Expert Users' Strategies to Detect Email Signature Spoofing Attacks
OpenPGP is one of the two major standards for end-to-end
email security. Several studies showed that serious usability
issues exist with tools implementing this standard. However,
a widespread assumption is that expert users can handle these
tools and detect signature spoofing attacks. We present a user
study investigating expert users’ strategies to detect signature
spoofing attacks in Thunderbird. We observed 25 expert users
while they classified eight emails as either having a legitimate
signature or not. Studying expert users explicitly gives us an
upper bound of attack detection rates of all users dealing with
PGP signatures. 52% of participants fell for at least one out
of four signature spoofing attacks. Overall, participants did\ud
not have an established strategy for evaluating email signature
legitimacy. We observed our participants apply 23 different
types of checks when inspecting signed emails, but only 8 of
these checks tended to be useful in identifying the spoofed or
invalid signatures. In performing their checks, participants
were frequently startled, confused, or annoyed with the user
interface, which they found supported them little. All these
results paint a clear picture: Even expert users struggle to
verify email signatures, usability issues in email security are
not limited to novice users, and developers may need proper
guidance on implementing email signature GUIs correctl
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide scan we identified 184 HTTPS servers repeating nonces, which fully breaks the authenticity of the connections. Affected servers include large corporations, financial institutions, and a credit card company. We present a proof of concept of our attack allowing to violate the authenticity of affected HTTPS connections which in turn can be utilized to inject seemingly valid content into encrypted sessions. Furthermore we discovered over 70,000 HTTPS servers using random nonces, which puts them at risk of nonce reuse if a large amount of data is sent over the same connection
Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Diffie-Hellman key exchange (DHKE) is a widely adopted method for exchanging cryptographic key material in realworld protocols like TLS-DH(E). Past attacks on TLS-DH(E) focused on weak parameter choices or missing parameter validation. The confidentiality of the computed DH share, the premaster secret, was never questioned; DHKE is used as a generic method to avoid the security pitfalls of TLS-RSA.
We show that due to a subtle issue in the key derivation of all TLS-DH(E) cipher suites in versions up to TLS 1.2, the premaster secret of a TLS-DH(E) session may, under certain circumstances, be leaked to an adversary. Our main result is a novel side-channel attack, named Raccoon attack, which exploits a timing vulnerability in TLS-DH(E), leaking the most significant bits of the shared Diffie-Hellman secret. The root cause for this side channel is that the TLS standard encourages non-constant-time processing of the DH secret. If the server reuses ephemeral keys, this side channel may allow an attacker to recover the premaster secret by solving an instance of the Hidden Number Problem. The Raccoon attack takes advantage of uncommon DH modulus sizes, which depend on the properties of the used hash functions. We describe a fully feasible remote attack against an otherwisesecure TLS configuration: OpenSSL with a 1032-bit DH modulus. Fortunately, such moduli are not commonly used on the Internet.
Furthermore, with our large-scale scans we have identified implementation-level issues in production-grade TLS implementations that allow for executing the same attack by directly observing the contents of server responses, without resorting to timing measurements
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!
Currently most practical attacks on cryptographic protocols like TLS are based on side channels, such as padding oracles. Some well-known recent examples are DROWN, ROBOT and Raccoon (USENIX Security 2016, 2018, 2021). Such attacks are usually found by careful and time-consuming manual analysis by specialists.
In this paper, we consider the question of how such attacks can be systematically detected and prevented before (large-scale) deployment. We propose a new, fully automated approach, which uses supervised learning to identify arbitrary patterns in network protocol traffic. In contrast to classical scanners, which search for known side channels, the detection of general patterns might detect new side channels, even “unexpected” ones, such as those from the ROBOT attack.
To analyze this approach, we develop a tool to detect Bleichenbacher-like padding oracles in TLS server implementations,
based on an ensemble of machine learning algorithms. We verify that the approach indeed detects known vulnerabilities successfully and reliably. The tool also provides detailed information about detected patterns to developers, to assist in removing a potential padding oracle. Due to the automation, the approach scales much better than manual analysis and could even be integrated with a CI/CD pipeline of a development environment, for example
Stacco: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
Intel Software Guard Extension (SGX) offers software applications enclave to
protect their confidentiality and integrity from malicious operating systems.
The SSL/TLS protocol, which is the de facto standard for protecting
transport-layer network communications, has been broadly deployed for a secure
communication channel. However, in this paper, we show that the marriage
between SGX and SSL may not be smooth sailing.
Particularly, we consider a category of side-channel attacks against SSL/TLS
implementations in secure enclaves, which we call the control-flow inference
attacks. In these attacks, the malicious operating system kernel may perform a
powerful man-in-the-kernel attack to collect execution traces of the enclave
programs at page, cacheline, or branch level, while positioning itself in the
middle of the two communicating parties. At the center of our work is a
differential analysis framework, dubbed Stacco, to dynamically analyze the
SSL/TLS implementations and detect vulnerabilities that can be exploited as
decryption oracles. Surprisingly, we found exploitable vulnerabilities in the
latest versions of all the SSL/TLS libraries we have examined.
To validate the detected vulnerabilities, we developed a man-in-the-kernel
adversary to demonstrate Bleichenbacher attacks against the latest OpenSSL
library running in the SGX enclave (with the help of Graphene) and completely
broke the PreMasterSecret encrypted by a 4096-bit RSA public key with only
57286 queries. We also conducted CBC padding oracle attacks against the latest
GnuTLS running in Graphene-SGX and an open-source SGX-implementation of mbedTLS
(i.e., mbedTLS-SGX) that runs directly inside the enclave, and showed that it
only needs 48388 and 25717 queries, respectively, to break one block of AES
ciphertext. Empirical evaluation suggests these man-in-the-kernel attacks can
be completed within 1 or 2 hours.Comment: CCS 17, October 30-November 3, 2017, Dallas, TX, US
On the insecurity of XML security
Die vorliegende Dissertation untersucht die Sicherheit von XML Encryption und XML Signature und stellt kritische Angriffe vor, die die scheinbare Sicherheit dieser Standards komplett aushebeln. Zunächst werden verschiedene XML Signature Wrapping Angriffstechniken betrachtet. Diese Angriffe ermöglichen es, die Integrität der signierten XML-Dokumente vollständig zu brechen. Das Ausmaß dieser Angriffe wird anhand von praktischen Angriffen in Cloud- und Single Sign-On Szenarien beispielhaft gezeigt.
Weiterhin beschreibt die vorliegende Dissertation mehrere praktische Angriffe auf XML Encryption. Die Angriffe brechen die Vertraulichkeit der mit RSA PKCS#1 v1.5 und CBC verschlĂĽsselten Nachrichten.
Diese Arbeit beeinflusste viele XML Frameworks, welche gegen die entwickelten Angriffstechniken geschĂĽtzt wurden. In Zusammenarbeit mit der W3C Arbeitsgruppe wurden in der neuesten Version des XML Encryption Standards GegenmaĂźnahmen gegen die vorgestellten Angriffe eingefĂĽhrt
Return Of Bleichenbacher\u27s Oracle Threat (ROBOT)
Many web hosts are still vulnerable to one of the oldest attacks against RSA in TLS. We show that Bleichenbacher’s RSA vulnerability from 1998 is still very prevalent in the Internet and affects almost a third of the top 100 domains in the Alexa Top 1 Million list, among them Facebook and Paypal. We identified vulnerable products from at least eight different vendors and open source projects, among them F5, Citrix, Radware, Cisco, Erlang, Bouncy Castle, and WolfSSL. Further we have demonstrated practical exploitation by signing a message with the private key of facebook.com’s HTTPS certificate. Finally, we discuss countermeasures against Bleichenbacher attacks in TLS and recommend to deprecate the RSA encryption key exchange in TLS and the PKCS #1 v1.5 standard