Stealing secrets with SSL/TLS and SSH -: Kleptographic attacks

被引:0
|
作者
Golobiewski, Zbigniew [1 ]
Kutylowski, Miroslaw [1 ]
Zagorski, Filip [1 ]
机构
[1] Wroclaw Univ Technol, Inst Math & Comp Sci, Wroclaw, Poland
关键词
kleptography; SSL; TLS; SSH;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present very simple kleptographic attacks on SSL/TLS and SSH protocols. They enable a party, which has slightly manipulated the code of a cryptographic library, to steal secrets of the user. According to the scenario of the kleptographic attacks the secrets can be stolen only by a party having a secret key not included in the manipulated code. The attacker needs only to record transmissions. The messages transmitted are indistinguishable from the not manipulated ones (even for somebody that knows the kleptocode inserted). Therefore, detection of infected nodes based on communication analysis is much harder than in the case of classical subliminal channels. The problems are caused by certain design features of SSL/TLS and SSH protocols that make them vulnerable for a kleptographic attack. We propose changes of these protocols that make them immune against this threat while all previous security features remain preserved.
引用
收藏
页码:191 / +
页数:3
相关论文
共 50 条
  • [41] Safe and Secure Communication Using SSL/TLS
    Kumar, Darapureddy Devendra
    Mukharzee, Jerripothula Desai
    Reddy, Chirla Vijay Durga
    Rajagopal, Shinu M.
    [J]. 2024 International Conference on Emerging Smart Computing and Informatics, ESCI 2024, 2024,
  • [42] Key Vulnerabilities in SSL & TLS That Needs To Be Mitigated
    Alhazmi, Shatha Abdulah E.
    Elleithy, Khaled
    [J]. 2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
  • [43] Integration of the digital signature in the protocol SSL/TLS
    Serhrouchni, Ahmed
    Hajjeh, Ibrahim
    [J]. ANNALES DES TELECOMMUNICATIONS-ANNALS OF TELECOMMUNICATIONS, 2006, 61 (5-6): : 522 - 541
  • [44] The prevalence of kleptographic attacks on discrete-log based cryptosystems
    Young, A
    Yung, M
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 264 - 276
  • [45] Integration of the digital signature in the protocol SSL/TLS [Intégration de la signature numérique au protocole SSL/TLS]
    Serhrouchni A.
    Hajjeh I.
    [J]. Annales Des Télécommunications, 2006, 61 (5-6): : 522 - 541
  • [46] Attacking RSA-based sessions in SSL/TLS
    Klíma, V
    Pokorny, O
    Rosa, T
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 426 - 440
  • [47] Means of stealing secrets and anti-stealing by electronic technology in Secret War
    Huang, Bao
    [J]. 2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL I, 2011, : 354 - 357
  • [48] DRPSD: An Novel Method of Identifying SSL/TLS Traffic
    Liu, Changxing
    Sun, Guanglu
    Xue, Yibo
    [J]. 2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [49] RFCcertDT: a testing tool for certificate validation in SSL/TLS
    Chen, Chu
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (03): : 20 - 25
  • [50] Incorporating a new hash function in OpenPGP and SSL/TLS
    Michael, Christina N.
    Su, Xiao
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, PROCEEDINGS, 2007, : 556 - +