Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Torturing OpenSSL

Black Hat via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of hardware vulnerabilities in secure computing systems through this Black Hat USA 2012 conference talk. Delve into a detailed end-to-end security attack on a microprocessor system, demonstrating how hardware weaknesses can be exploited to compromise software-secure systems. Learn about a side-channel attack on the RSA signature algorithm using transient hardware faults induced through various methods. Discover the process of extracting private RSA keys from erroneously signed messages affected by single-bit faults during Fixed Window Exponentiation. Examine the attack implementation using an FPGA platform with a SPARC-based microprocessor running unmodified Linux and OpenSSL. Understand the implications of this attack, which requires only proximity to the victim system and leaves no detectable trail. Witness a live demonstration of the attack on an FPGA platform using a simplified 128-bit private key system.

Syllabus

Introduction
Cryptography is everywhere
Consumer devices
RSA Authentication
How does it work
Authentication
Attacks
Faults
Theory
Hardware
Openssl Authentication
Private Key Instruction
Simple Case
Fault Injection
Final Result
Last Attempt
Analysis
Conclusions
Takehome message

Taught by

Black Hat

Reviews

Start your review of Torturing OpenSSL

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.