Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy

Black Hat via YouTube

Overview

Learn how to recover an RSA private key from a TLS session with Perfect Forward Secrecy in this 42-minute Black Hat conference talk. Explore the theory behind the attack, including the generation of faulty digital signatures due to hardware faults, and understand why embedded devices are particularly vulnerable. Discover the prerequisites for a successful attack, examine RSA signatures and RSA-CRT, and analyze vulnerable crypto libraries. Gain insights into the practical implementation of this technique, including both passive and active attack modes. Delve into topics such as PKCS 1.5 padding, suitable ciphersuites, and the workings of the High Voltage! tool. Examine the application of these concepts to IKEv1 Phase 1 Main Mode and Aggressive Mode with signature authentication.

Syllabus

Intro
About the topic
Roadmap
What is a RSA signature
Recover a RSA private key: Prerequisites
What if the attack is successful?
(a) RSA Signature with RSA-CRT
(c) Presence of faulty signature
(b) Signature calculated on known values
(b) PKCS 1.5 Padding
The right ciphersuite...
How High Voltage! works...
How RSA works
RSA Rule 1
Signing with RSA-CRT
TLS RSA-CRT Attack in "pills"
Vulnerable crypto libraries (2)
IKEV1 Phase 1 Main Mode (Signature Auth)
IKEv1 Phase 1 Aggressive Mode (Signature Auth)

Taught by

Black Hat

Reviews

Start your review of Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.