Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Bad Randomness: Protecting Against Cryptography's Perfect Crime

Автор: Black Hat

Загружено: 2024-08-21

Просмотров: 1597

Описание:

Crypto systems are the cornerstone of our digital security infrastructure, whether they are used to encrypt our data to protect their confidentiality or for signing to prove data authenticity.

However, most crypto systems have an Achilles heel: Their security relies on the proper randomness of their parameters' values, such as keys or nonces.

As a result, bad randomness is cryptography's perfect crime: Powerful enough to totally break crypto systems, yet highly stealthy. Unlike other malicious input based attack vectors, a bad randomness input is indistinguishable from a benign one, therefore making it impossible to protect against in real time and very hard to detect even in a post mortem analysis.

While the subject of bad randomness is not new in itself, it is often in the context of engineers' negligence or low cost IoT devices. In this talk, we will show how bad randomness was used in the wild to compromise highly targeted individuals and high value accounts.

One such example is the nation-state's APT Reductor malware, selectively fiddling with the victims' random generator (PRNG) to compromise TLS encryption. We will unearth for the first time how it could break TLS ECDHE "perfect forward secrecy" (PFS) to allow passive eavesdropping, thus making it more beneficial to attackers than the actual server TLS certificate(!). We will discuss why this capability remained undetected in previous analyses and share a new tool to demonstrate such passive decryption.
Another relevant example from a different field is our recently discovered Bitcoin's "dark forest" bots lurking for bad randomness in blockchains' signature keys, to steal millions of dollars of funds in seconds. We will explain and demonstrate this attack and share a tool to recreate it.

To solve this acute problem, we will suggest a novel architecture that allows crypto systems to minimize their blind trust in randomness. Where it is possible, it eliminates the need for additional randomness by relying on well-reputed past randomness. Where it is impossible, it applies secure Multi-Party Computation (MPC) to the protocol and its randomness. Distributing systems' randomness and removing single points of failure increases their resilience against bad randomness exploits.

By:
Tal Be'ery | Co-Founder, CTO, Zengo

Full Abstract & Presentation Materials:
https://www.blackhat.com/asia-24/brie...

Bad Randomness: Protecting Against Cryptography's Perfect Crime

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4360 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "KbVWEQeeMzI" ["related_video_title"]=> string(58) "Back to the Roots: Finding the Origin of CSP Security Bugs" ["posted_time"]=> string(27) "9 месяцев назад" ["channelName"]=> string(9) "Black Hat" } [1]=> object(stdClass)#4333 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "szcBD3l5xDE" ["related_video_title"]=> string(48) "209 Cryptography 0 to 128 in 50 Minutes Ben Tice" ["posted_time"]=> string(19) "8 лет назад" ["channelName"]=> string(15) "Adrian Crenshaw" } [2]=> object(stdClass)#4358 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "BT38K6NqETE" ["related_video_title"]=> string(125) "Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках" ["posted_time"]=> string(27) "6 месяцев назад" ["channelName"]=> string(22) "Раскадровка" } [3]=> object(stdClass)#4365 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "dxJfjcQPZo8" ["related_video_title"]=> string(56) "Redefining the Origin of Secrecy in a Post-Quantum World" ["posted_time"]=> string(23) "1 месяц назад" ["channelName"]=> string(9) "Black Hat" } [4]=> object(stdClass)#4344 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "Ilg3gGewQ5U" ["related_video_title"]=> string(85) "Что происходит с нейросетью во время обучения?" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(11) "3Blue1Brown" } [5]=> object(stdClass)#4362 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "eZczwNFzxus" ["related_video_title"]=> string(83) "The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them" ["posted_time"]=> string(25) "4 недели назад" ["channelName"]=> string(9) "Black Hat" } [6]=> object(stdClass)#4357 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "MCIhB7Sy9NU" ["related_video_title"]=> string(93) "Аналоговые компьютеры возвращаются? Часть 2 [Veritasium]" ["posted_time"]=> string(21) "3 года назад" ["channelName"]=> string(10) "Vert Dider" } [7]=> object(stdClass)#4367 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "s7pnANMPigg" ["related_video_title"]=> string(119) "Как Telegram связан с ФСБ? Что это значит лично для вас? Расследование" ["posted_time"]=> string(21) "8 дней назад" ["channelName"]=> string(27) "Важные истории" } [8]=> object(stdClass)#4343 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "aircAruvnKk" ["related_video_title"]=> string(101) "Но что такое нейронная сеть? | Глава 1. Глубокое обучение" ["posted_time"]=> string(19) "7 лет назад" ["channelName"]=> string(11) "3Blue1Brown" } [9]=> object(stdClass)#4361 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "iBlPlXRxHF0" ["related_video_title"]=> string(73) "WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys" ["posted_time"]=> string(25) "4 недели назад" ["channelName"]=> string(9) "Black Hat" } }
Back to the Roots: Finding the Origin of CSP Security Bugs

Back to the Roots: Finding the Origin of CSP Security Bugs

209 Cryptography 0 to 128 in 50 Minutes Ben Tice

209 Cryptography 0 to 128 in 50 Minutes Ben Tice

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Redefining the Origin of Secrecy in a Post-Quantum World

Redefining the Origin of Secrecy in a Post-Quantum World

Что происходит с нейросетью во время обучения?

Что происходит с нейросетью во время обучения?

The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

The Bugs in Your Bootloaders: Embedded Device Secure Boot Fails and How to Fix Them

Аналоговые компьютеры возвращаются? Часть 2 [Veritasium]

Аналоговые компьютеры возвращаются? Часть 2 [Veritasium]

Как Telegram связан с ФСБ? Что это значит лично для вас? Расследование

Как Telegram связан с ФСБ? Что это значит лично для вас? Расследование

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

Но что такое нейронная сеть? | Глава 1. Глубокое обучение

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

WiFi Calling: Revealing Downgrade Attacks and Not-so-private private Keys

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]