Completed
Preventing Version Downgrade
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Protecting TLS from Legacy Crypto
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Agile Cryptographic Protocols
- 3 Attacks on Legacy Crypto in TLS
- 4 TLS protocol overview
- 5 Protocol Agility in TLS
- 6 Example Protocol Instance
- 7 miTLS: New TLS Attacks
- 8 Anonymous Diffie-Hellman (DHanon)
- 9 Man-in-the-Middle attack on DH anon
- 10 SIGMA: Authenticated DH
- 11 SIGMA with Group Negotiation
- 12 Logjam: MitM Group Downgrade Attack
- 13 Downgrade Protection in TLS 1.2
- 14 Logjam: Exploiting Pre-Computation
- 15 Logjam: Impact and Countermeasures
- 16 SIGMA with Generic Negotiation
- 17 Downgrade Protection via Signatures
- 18 SLOTH: Transcript Collision Attacks
- 19 Computing a Transcript Collision
- 20 Chosen-Prefix Transcript Collisions
- 21 Other SLOTH Vulnerabilities
- 22 AKEs with Parameter Negotiation
- 23 Agile AKE Security Goals
- 24 Agile Agreement vs. Downgrades
- 25 A New Downgrade Resilience Goal
- 26 Testing the Definition
- 27 TLS 1.3 Negotiation Sub-Protocol
- 28 Group Negotiation with Retry
- 29 Full Transcript Signatures
- 30 Preventing Version Downgrade
- 31 TLS 1.3 is Downgrade Resilient
- 32 Final Thoughts