mathy vanhoef
play

Mathy Vanhoef Public PhD Defense A Security Analysis of the WPA- - PowerPoint PPT Presentation

Mathy Vanhoef Public PhD Defense A Security Analysis of the WPA- TKIP and TLS Security Protocols Data handled by computers: Banking details Emails Messaging Adult websites Private files Mobile devices 2 Goal of dissertation Is the


  1. Mathy Vanhoef Public PhD Defense A Security Analysis of the WPA- TKIP and TLS Security Protocols

  2. Data handled by computers: Banking details Emails Messaging Adult websites Private files Mobile devices 2

  3. Goal of dissertation Is the transmission of this data properly protected? 3

  4. How is data transmitted? Wireless Computer Server router Study security of network protocols used at: 1. Your wireless network 2. Your internet connection 4

  5. How is data transmitted? Wireless Computer Server router Study security of network protocols used at: 1. Your wireless network 2. Your internet connection 5

  6. Wireless network security Computer Easy to intercept transmitted data Solution: pick password and use encryption! Wireless router 6

  7. Available cipher suites? 1999 2003 2004 WEP WPA-TKIP AES-CCMP 7

  8. Available cipher suites? 1999 2003 2004 WEP WPA-TKIP AES-CCMP Broken Acceptable Secure 8

  9. Is WPA-TKIP still used? Usage in 2013: 66% support TKIP 19% support only TKIP Need more arguments to kill TKIP! 9

  10. Is WPA-TKIP still used? Usage in 2016: 59% support TKIP 3% support only TKIP Need more arguments to kill TKIP! 10

  11. Discovered new attacks 1. Efficient Denial of Service 2. Forge arbitrary packets to client 3. Decrypt traffic towards client In 2016, 59% of networks still are vulnerable! 11

  12. Impact of attack unique address for every computer Website 2.2.2.2 Wireless router Where is detijd.be? Computer 12

  13. Impact of attack unique address for every computer Website 2.2.2.2 Wireless router detijd.be is at 2.2.2.2 Computer 13

  14. Impact of attack Website 2.2.2.2 Wireless router Load detijd.be Computer 14

  15. Impact of attack Website 2.2.2.2 Wireless router Load detijd.be detijd.be is at 4.4.4.4 Computer Attacker 4.4.4.4 15

  16. Impact of attack Website Victim now contacts 2.2.2.2 attacker to load detijd.be Wireless router Load detijd.be detijd.be is at 4.4.4.4 Computer Attacker 4.4.4.4 16

  17. Conclusion Use only AES-CCMP! 17

  18. How is data transmitted? Wireless Computer Server router Study security of network protocols used at: 1. Your wireless network 2. Your internet connection 18

  19. Securing internet traffic  Websites can be secured using HTTPS  HTTPS is based on TLS  Internally TLS can use AES, RC4,…  Which one is widely used? Is it secure? 19

  20. Is RC4 still used? In 2013 half of all TLS connections used RC4 60% 50% 50% 40% 30% 30% 20% 13% 10% 0% March 2013 Februari 2015 July 2015 20

  21. RC4 encryption Key Password123! RC4 RC4 56, 0, 234, 102, 41, … Keystream Plaintext Ciphertext 21

  22. RC4 encryption 56, 0, 234, 102, … RC4 Password123!  The numbers (keystream) should be random  Not the case for RC4 due to biases ! 22

  23. RC4 encryption 56, 0 , 234, 102, … RC4 Password123!  The numbers (keystream) should be random  Not the case for RC4 due to biases ! ≈ 23

  24. Why is this bad?  Imagine only second keystream byte is used ≈  When is zero is ‘rolled’, no encryption occurs  Most frequent ciphertextbyte is the real value 24

  25. 25

  26. After encryption, image is unrecognizable 26

  27. RC4 biases  Most frequent pixel value is the real value ? 27

  28. Replace all pixels in block with most frequent value! ? 28

  29. Try to recover rough outline using bigger blocks? 29

  30. Try to recover rough outline using bigger blocks? 30

  31. 31

  32. 32

  33. 33

  34. How to recover details?  Capture multiple encryptions! …  Combine with biases to recover all info: … 34

  35. 35

  36. 36

  37. 37

  38. 38

  39. 39

  40. How to recover details?  Capture multiple encryptions: …  Combine with biases to recover all info: … 40

  41. Summary: abusing RC4 biases Multiple Encryption Use Biases Encryptions 41

  42. Our contributions We improved these techniques by:  Also using other biases  Generating a list of plaintext candidates  Rapidly generating multiple encryptions Using this we decrypt a HTTPS cookie. 42

  43. Cookies are unique identifiers Browser Facebook Get newsfeed Cookie Identity Cookie: ae637f8c5 ae637f8c5 Mathy … … 43

  44. Cookies are unique identifiers Browser Facebook Get newsfeed Cookie Identity Cookie: ae637f8c5 ae637f8c5 Mathy … … Return newsfeed of Mathy Vanhoef 44

  45. Cookies are unique identifiers Browser Facebook Get newsfeed Cookie Identity Cookie: ae637f8c5 ae637f8c5 Mathy Included in … … all requests Return newsfeed of Mathy Vanhoef 45

  46. Decrypting the cookie Attacker Browser Facebook Cookie: … Cookie: … … … Cookie: Cookie: … ae637f8c5  Generate many requests, use biases to recover the cookie! 46

  47. Decrypting 16-character cookie Need one billion encryptions of cookie Ciphertext copies times 2 27 47

  48. Decrypting 16-character cookie Need one billion encryptions of cookie Takes 75 hours with 4450 requests / second Ciphertext copies times 2 27 48

  49. Practical impact In response, browsers disabled RC4: Chrome: dropped support in v48 (20 Jan. 2016) Firefox: dropped support in v44 (26 Jan. 2016) IE11: supports RC4 “will be disabled in forthcoming update” Edge: supports RC4 49

  50. Decrypting Cookies 50

  51. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend