Overview
Syllabus
Introduction
Getting Started
TLS Encryption
symmetric encryption
lucky 13 attack
RC4 attack
GCM
Other cryptographers
Adam Langley
TLS specification
Scanning the Internet
Tracking Devices
Radware
Devices
Sign For
OpenSSL 101
Attack Description
GCM Background
GCM Authentication
Highlevel attackers
Lowlevel attackers
Nonce reuse
Fully known polynomial
Application in TLS
GCM stream cipher
Changing the HTML response
Attacking the same domain
Future trends
Conclusion
GitHub
Session Key
Problems with GCM
Weak keys in GCM
What can we bring to hardware vendors
Taught by
Black Hat