SLIDE 26 Introduction Client Authentication Downgrade Attack Channel Binding Conclusion
Breaking client authentication in DTLS 1.2
Using a common-prefjx collision
▶ We need h(CH(ns, ck, gx, exs)) = h(CH(ns, ck′, gx′, ex′ s)) ▶ Common-prefix collision attack
CH(ns, sid, ck, gx, exs) = 𝙸𝙴𝚂‖ns‖sid ‖lck‖C1‖gx′‖ex′
s‖gx‖exs
CH(ns, sid′, ck′, gx′, ex′
s) = 𝙸𝙴𝚂‖ns‖sid′
71bytes
‖l′
ck‖C2‖gx′‖ex′ s‖gx‖exs
▶ 2-block prefix 𝙸𝙴𝚂‖ns‖sidL ▶ First collision block start with sidR, difgerence in lck (byte 7) ▶ Somewhat practical with SHA1 signatures ▶ Constraints on first block don’t afgect the cost much ▶ Estimated complexity ≈ 261
- G. Leurent, K. Bhargavan (Inria)
Transcript collision Attacks Dagstuhl 16012 14 / 20