Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Raccoon Attack - Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 TLS-DH(E)
- 3 Constant Time Execution
- 4 Attack Overview
- 5 Retrieving the PMS
- 6 Key Derivation in TLS
- 7 Merkle-Damgård-Construction
- 8 Hashfunction Performance (expectation)
- 9 SSL 3 Key Derivation
- 10 TLS 1.0/1.1 PRF
- 11 HMAC in the PRF
- 12 Attacker can choose Hash Functions
- 13 Measurement Errors
- 14 Special Timing Measurement Equipment
- 15 Direct Raccoon + Non-Determinism
- 16 Impact
- 17 Countermeasure
- 18 So.... no Side-Channel?
- 19 Raccoon and ECDH(E)
- 20 Raccoon and TLS 1.3
- 21 Raccoon and eTLS/ETS
- 22 Why the mess?
- 23 Raccoon & DH(E) Proofs
- 24 PRF-ODH Assumption
- 25 Raccoon and other Protocols
- 26 Conclusion