Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

TPM-FAIL - TPM Meetings Timing and Lattice Attacks

TheIACR via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive analysis of Trusted Platform Module (TPM) vulnerabilities in this WAC 2020 presentation by Daniel Moghimi. Delve into cryptanalysis techniques, focusing on ECDSA nonce side-channel attacks and their implications for TPM security. Examine high-resolution timing tests on Intel PTT (FTPM) and understand the application of lattice-based cryptanalysis to the hidden number problem. Investigate the TPM-Fail key recovery results and their real-world impact through a case study on StrongSwan VPN. Learn about the challenges of secure cryptographic implementation, particularly for ECDSA, and discover the MicroWalk approach for identifying potential vulnerabilities. Gain valuable insights into the complexities of trusted computing and the importance of robust cryptographic implementations in modern security systems.

Syllabus

Intro
Cryptanalysis - ECDSA Nonce
Side-Channel Cryptanalysis
Side-Channel Attacks
Trusted Platform Module (TPM)
TPM - Digital Signatures
Trusted Computing Group
High-resolution Timing Test - Intel PTT (FTPM)
Lattice and Hidden Number Problem
TPM-Fail - Key Recovery Results
TPM-Fail Case Study: StrongSwan VPN
Remote StrongSwan VPN
CacheQuote (2)
Cryptographic Implementation is Hard - ECDSA
MicroWalk Approach
MicroWalk Implementation
Questions?!

Taught by

TheIACR

Reviews

Start your review of TPM-FAIL - TPM Meetings Timing and Lattice Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.