SLIDE 1
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
1
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in - - PowerPoint PPT Presentation
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS Hanno Bck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic 1 TLS Encryption 1. Asymmetric key exchange RSA, DHE, ECDHE 2. Symmetric encryption 2
1
2
3
5
7
8
9
10
13
14
15
16
len(A)||len(C)
17
19
21
len(A)||len(C)
22
len(A)||len(C)
24
26
27
28
30
GET visa.dk/index.html
HTTP 1.1 200 OK … <html> <h1>Hello Visa</h1> </html> HTTP 1.1 200 OK … <html> <script> … </script> </html>
32
33
34