In Search of CurveSwap Measuring Elliptic Curve Implementations in the Wild

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=pzEY0fBOhX4



Duration: 26:19
7 views
0


We survey elliptic curve implementations from several vantage points. We perform internet-wide scans for TLS on a large number of ports, as well as SSH and IPsec to measure elliptic curve support and implementation behaviors, as well as collect passive measurements of client curve support for TLS. We also perform active measurements to estimate server vulnerability to known attacks against elliptic curve implementations, including support for weak curves, invalid curve attacks, and curve twist attacks. We estimate that 0.77% of HTTPS hosts, 0.04% of SSH hosts, and 4.04% of IKEv2 hosts that support elliptic curves do not perform curve validity checks as specified in elliptic curve standards. We describe how such vulnerabilities could be used to construct an elliptic curve parameter downgrade attack called CurveSwap for TLS, and observe that there do not appear to be combinations of weak behaviors we examined enabling a feasible CurveSwap attack in the wild. We also analyze source code for elliptic curve implementations, and find that a number of libraries fail to perform point validation for JSON Web Encryption, and find a flaw in the Java and NSS multiplication algorithms.


Presenters:
Luke Valenta - PhD Student, University of Pennsylvania
Luke is a PhD student in the Department of Computer and Information Science at the University of Pennsylvania. He works with Nadia Heninger in the Security Laboratory, and helps organize the Security Reading group. He is broadly interested in applied cryptography, computer security, privacy, elliptic curve cryptography, cryptocurrencies, and distributed systems.
Nick Sullivan - Head of Cryptography, Cloudflare
Nick Sullivan is a leading cryptography and security technologist. As head of Cryptography at Cloudflare he is responsible for overseeing all cryptographic products and strategy.
Black Hat - Europe - 2018
Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering