Protecting TLS from Legacy Crypto

Protecting TLS from Legacy Crypto

TheIACR via YouTube Direct link

TLS protocol overview

4 of 32

4 of 32

TLS protocol overview

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Protecting TLS from Legacy Crypto

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Agile Cryptographic Protocols
  3. 3 Attacks on Legacy Crypto in TLS
  4. 4 TLS protocol overview
  5. 5 Protocol Agility in TLS
  6. 6 Example Protocol Instance
  7. 7 miTLS: New TLS Attacks
  8. 8 Anonymous Diffie-Hellman (DHanon)
  9. 9 Man-in-the-Middle attack on DH anon
  10. 10 SIGMA: Authenticated DH
  11. 11 SIGMA with Group Negotiation
  12. 12 Logjam: MitM Group Downgrade Attack
  13. 13 Downgrade Protection in TLS 1.2
  14. 14 Logjam: Exploiting Pre-Computation
  15. 15 Logjam: Impact and Countermeasures
  16. 16 SIGMA with Generic Negotiation
  17. 17 Downgrade Protection via Signatures
  18. 18 SLOTH: Transcript Collision Attacks
  19. 19 Computing a Transcript Collision
  20. 20 Chosen-Prefix Transcript Collisions
  21. 21 Other SLOTH Vulnerabilities
  22. 22 AKEs with Parameter Negotiation
  23. 23 Agile AKE Security Goals
  24. 24 Agile Agreement vs. Downgrades
  25. 25 A New Downgrade Resilience Goal
  26. 26 Testing the Definition
  27. 27 TLS 1.3 Negotiation Sub-Protocol
  28. 28 Group Negotiation with Retry
  29. 29 Full Transcript Signatures
  30. 30 Preventing Version Downgrade
  31. 31 TLS 1.3 is Downgrade Resilient
  32. 32 Final Thoughts

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.