and
play

and Elie Bursztein with the help of Marc Stevens (CWI), Pierre - PowerPoint PPT Presentation

and Elie Bursztein with the help of Marc Stevens (CWI), Pierre Karpman (INRIA), Ange Albertini, Yarik Markov, Alex Petit-Bianco Digest uniqueness 3171 AC03 B186 File 1 One-way function 42A9 1C4E 3CBE 2 File 2 Attacking hash functions


  1. and Elie Bursztein with the help of Marc Stevens (CWI), Pierre Karpman (INRIA), Ange Albertini, Yarik Markov, Alex Petit-Bianco

  2. Digest uniqueness 3171 AC03 B186 File 1 One-way function 42A9 1C4E 3CBE 2 File 2

  3. Attacking hash functions Finding a SHA-1 collision Post-collision world

  4. https://shattered.io

  5. Attacker file 1 Attacker file 2 3713ACE30E7ABBA https://shattered.io

  6. Unknown file Attacker file 42ACE13F0E93BAD https://shattered.io

  7. Known file Attacker file BAD37ACE308E93D https://shattered.io

  8. https://shattered.io

  9. Bruteforce is impractical Cryptanalysis to the rescue

  10. File File File 1st block 2nd block last block IV Hash SHA1compress() SHA1compress() SHA1compress() R.C Merkle - Secrecy, authentication, and public key systems (1979)

  11. ? + Message block F F F Chain value

  12. ? + Message Messages differential path block F F F Equation system Chain value

  13. File 1 (block 1) ? File 2 (block 1) Near collision Near collision != != Collision Collision File 1 (block m) = File 2 (block m)

  14. https://shattered.io

  15. Collision blocks Fixed prefix (P) Arbitrary suffix (S) (C1) Collision blocks Fixed prefix (P) Arbitrary suffix (S) (C2) P==P and C1!=C2 and S==S

  16. Specially crafted Specially crafted prefix prefix Collision blocks (C1) Collision blocks (C2) Partial Suffix displayed (S) Partial Suffix displayed (S) File 1 File 2

  17. Collision blocks Fixed prefix (P1) Arbitrary suffix (S) (C1) Collision blocks Fixed prefix (P2) Arbitrary suffix (S) (C2) P1!=P2 and C1!=C2 and S==S

  18. https://shattered.io

  19. MD5 SSL certificate forgery

  20. Victim certificate Rogue signing certificate Serial number Serial number Validity period Validity period Real cert Rogue cert domain name (* wildcard) RSA public key X509 extensions CA=TRUE RSA public key Netscape Comment X509 extension X509 extensions CA=FALSE Signature Signature

  21. Collision resistance Preimage resistance Security Fixed prefix Chosen attack Security claim Best attack Claim 2 64 2 1 MD4 2 64 2 16 2 39 MD5 2 80 2 63 2 77 SHA-1

  22. 2. Compute 3. Develop 1. Craft file 4. Compute near-collision full collision prefix collision blocks attack 2015 2015 - 2016 2016 2017

  23. PDF header PDF header JPEG header JPEG header JPEG comment JPEG comment length length length length 2 collision comment in comment Image 1 Image 2 File 1 File 2

  24. Work in small batches ~1h Refactor code to be stateless Factory paradigm not map-reduce

  25. Determine Craft non Find DV attack linear additional selection success path conditions conditions Write Compute Find Fix attack collision speed-ups solvability code

  26. Final collision check (CPU) Work step by step Collision blocks (C1) Always try to work at the highest step Collision blocks (C1) Parallelized: One thread / one solution Base solution (CPU)

  27. https://github.com/nneonneo/sha1collider https://shattered.io

  28. PDF header JPEG start JPEG comment Fixed Comment length = 0x173 Comment length = 0x17F Collision block JPEG comment Visual Desync Variable Image parsed Image as comment

  29. https://shattered.io

  30. Transition plan slowly in the making

  31. Leverage how collisions are created Only requires one file to detect collision Trivial Negligible false positives differences required for feasible attacks

  32. Github.com JGit

  33. Git 2.12.2 (Mar 2017)

  34. ~4.45%

  35. MD 2 128 MD 2 128 2 128 Sponge 2 128 2 256 HAIFA

  36. SHA-1 is dead Counter-cryptanalysis Hash diversity long live to as a means of as a safeguard for SHA-256 & SHA-3 detection the years to come

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend