Completed
FIPS Requirements
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Pseudorandom Black Swans: Cache Attacks on CTR_DRBG
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Lesson Learned (the hard way)
- 3 Standardized Designs
- 4 CTR_DRBG: Design
- 5 CTR_DRBG: Generate Function
- 6 Key Rotation Flaw
- 7 Problem 1: Key Not Rotated Often Enough
- 8 Problem 2: Lack of Entropy
- 9 Is a side-channel attack on CTR_DRBG realistic?
- 10 FIPS Requirements
- 11 Finding long PRG outputs in TLS handshake
- 12 Attack Scenario
- 13 Attacking TLS 1.2 RSA key exchange with client auth
- 14 Results: State Recovery
- 15 Attack Complexity
- 16 AES Internal State
- 17 Examining the Differential Structure
- 18 Differential Attack
- 19 Towards a realistic attack
- 20 Interrupting SGX Execution
- 21 First Attempt
- 22 Experimental Setup
- 23 Lessons