Completed
Logjam: Exploiting Pre-Computation
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Protecting TLS from Legacy Crypto
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agile Cryptographic Protocols
- 3 Attacks on Legacy Crypto in TLS
- 4 TLS protocol overview
- 5 Protocol Agility in TLS
- 6 Example Protocol Instance
- 7 miTLS: New TLS Attacks
- 8 Anonymous Diffie-Hellman (DHanon)
- 9 Man-in-the-Middle attack on DH anon
- 10 SIGMA: Authenticated DH
- 11 SIGMA with Group Negotiation
- 12 Logjam: MitM Group Downgrade Attack
- 13 Downgrade Protection in TLS 1.2
- 14 Logjam: Exploiting Pre-Computation
- 15 Logjam: Impact and Countermeasures
- 16 SIGMA with Generic Negotiation
- 17 Downgrade Protection via Signatures
- 18 SLOTH: Transcript Collision Attacks
- 19 Computing a Transcript Collision
- 20 Chosen-Prefix Transcript Collisions
- 21 Other SLOTH Vulnerabilities
- 22 AKEs with Parameter Negotiation
- 23 Agile AKE Security Goals
- 24 Agile Agreement vs. Downgrades
- 25 A New Downgrade Resilience Goal
- 26 Testing the Definition
- 27 TLS 1.3 Negotiation Sub-Protocol
- 28 Group Negotiation with Retry
- 29 Full Transcript Signatures
- 30 Preventing Version Downgrade
- 31 TLS 1.3 is Downgrade Resilient
- 32 Final Thoughts