the devil is in the (implementation) details
DESCRIPTION
Let's see how simple implementation problems in cryptosystems can lead to severe issues and full plaintext recovery even using strong algorithms like RSA. Presented @ Università degli Studi di Bergamo (Italy) on 05/06/2013 during the Security of Systems class taught by Prof. Stefano Paraboschi. [Warning: the presentation is not meant to be studied but to provide the presenter a visual canvas that needs to be filled with her words]TRANSCRIPT
![Page 1: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/1.jpg)
The devil is in thedetails
how NOT to do security
implementation
05/06/2013 - Università degli Studi di Bergamo Enrico Bacis
![Page 2: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/2.jpg)
Side Channel Attacks
![Page 3: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/3.jpg)
A parity problem
![Page 4: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/4.jpg)
![Page 5: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/5.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
n = 15 (p = 3, q = 5)
![Page 6: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/6.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
enc(m)
ok
![Page 7: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/7.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
![Page 8: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/8.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
enc(2·m)
ok
![Page 9: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/9.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
enc(2·m)
ok
![Page 10: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/10.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
![Page 11: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/11.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
enc(4·m)
err
![Page 12: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/12.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
![Page 13: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/13.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
enc(8·m)
ok
![Page 14: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/14.jpg)
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14
![Page 15: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/15.jpg)
Multiplicative Property of RSA
![Page 16: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/16.jpg)
Can we only hack farms?
![Page 17: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/17.jpg)
PKCS#1 v1.5
0002 RANDOM PAD 00 MESSAGE
Broken by Bleichenbacher Attack (1998)
![Page 18: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/18.jpg)
Electronic Codebook
![Page 19: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/19.jpg)
ECB CBC
![Page 20: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/20.jpg)
Cipher Block Chaining
![Page 21: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/21.jpg)
![Page 22: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/22.jpg)
Padding Oracle Attack
![Page 23: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/23.jpg)
![Page 24: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/24.jpg)
Timing Attack
![Page 25: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/25.jpg)
![Page 26: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/26.jpg)
"Never ever implementyour own cryptosystem"
( Dan Boneh )
![Page 27: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/27.jpg)
Android and Mobile Vulnerabilities
![Page 28: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/28.jpg)
Sniffing
![Page 29: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/29.jpg)
Man In The Middle Attack
![Page 30: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/30.jpg)
Man In The Middle Attack
![Page 31: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/31.jpg)
Why Eve and Mallory Love Android
1074 of 13500 (8%) apps
● Trusting all Certicates● Allowing all Hostnames
39.5 to 185 million users
SSL/TLS issues
![Page 32: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/32.jpg)
![Page 33: The devil is in the (implementation) details](https://reader034.vdocument.in/reader034/viewer/2022042815/55757adcd8b42adb7e8b4ba2/html5/thumbnails/33.jpg)
Thank you