Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS

Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS

Black Hat via YouTube Direct link

Introduction

1 of 34

1 of 34

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Nonce-Disrespecting Adversaries - Practical Forgery Attacks on GCM in TLS

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Getting Started
  3. 3 TLS Encryption
  4. 4 symmetric encryption
  5. 5 lucky 13 attack
  6. 6 RC4 attack
  7. 7 GCM
  8. 8 Other cryptographers
  9. 9 Adam Langley
  10. 10 TLS specification
  11. 11 Scanning the Internet
  12. 12 Tracking Devices
  13. 13 Radware
  14. 14 Devices
  15. 15 Sign For
  16. 16 OpenSSL 101
  17. 17 Attack Description
  18. 18 GCM Background
  19. 19 GCM Authentication
  20. 20 Highlevel attackers
  21. 21 Lowlevel attackers
  22. 22 Nonce reuse
  23. 23 Fully known polynomial
  24. 24 Application in TLS
  25. 25 GCM stream cipher
  26. 26 Changing the HTML response
  27. 27 Attacking the same domain
  28. 28 Future trends
  29. 29 Conclusion
  30. 30 GitHub
  31. 31 Session Key
  32. 32 Problems with GCM
  33. 33 Weak keys in GCM
  34. 34 What can we bring to hardware vendors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.