Cryptography for Software and Web Developers

Similar documents
Everyday Cryptography

INSTANT messaging is a kind of online chat offering a realtime

Usable Crypto: Introducing minilock. Nadim Kobeissi HOPE X, NYC, 2014

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Crypho Security Whitepaper

Bit Chat: A Peer-to-Peer Instant Messenger

KEY DISTRIBUTION: PKI and SESSION-KEY EXCHANGE. Mihir Bellare UCSD 1

A Question of Key Length

Network Security - ISA 656 Security

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

Key & Data Storage on Mobile Devices

Is Your SSL Website and Mobile App Really Secure?

SecureCom Mobile s mission is to help people keep their private communication private.

For Paranoid People. by _NSAKEY

What is network security?

CS Final Exam

Authentication requirement Authentication function MAC Hash function Security of

ICOM 5018 Network Security and Cryptography

Is your data safe out there? -A white Paper on Online Security

IT Networks & Security CERT Luncheon Series: Cryptography

Client Server Registration Protocol

Chapter 7: Network security

SSL/TLS: The Ugly Truth

An Introduction to Cryptography and Digital Signatures

Applying Cryptography as a Service to Mobile Applications

CSCE 465 Computer & Network Security

Understanding Digital Certificates and Wireless Transport Layer Security (WTLS)

Cryptography & Digital Signatures

Lecture 9 - Message Authentication Codes

Web Application Security

Cryptography and Network Security: Summary

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Web and Security 1 / 40

Signing and Encryption with GnuPG

Programming Project #1

Information Security

Mcabber User Guide. franky

Security: Focus of Control. Authentication

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Sync Security and Privacy Brief

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.

Understanding Digital Certificates and Secure Sockets Layer (SSL)

CS Computer Security Third topic: Crypto Support Sys

YALE UNIVERSITY DEPARTMENT OF COMPUTER SCIENCE

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

EECS 588: Computer and Network Security. Introduction

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

National Security Agency Perspective on Key Management

Overview of Public-Key Cryptography

Modeling and verification of security protocols

Threema security assessment

Application Layer (1)

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

An Introduction to Cryptography as Applied to the Smart Grid

Message Authentication Codes

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web Security. Crypto (SSL) Client security Server security 2 / 40. Web Security. SSL Recent Changes in TLS. Protecting the Client.

Analyzing the Security Schemes of Various Cloud Storage Services

VALLIAMMAI ENGINEERING COLLEGE

Ciphire Mail. Abstract

Secure Sockets Layer

Lecture 9: Application of Cryptography

Key Management (Distribution and Certification) (1)

CPSC 467: Cryptography and Computer Security

Attestation and Authentication Protocols Using the TPM

Evaluation of Digital Signature Process

Installation and usage of SSL certificates: Your guide to getting it right

CUNSHENG DING HKUST, Hong Kong. Computer Security. Computer Security. Cunsheng DING, HKUST COMP4631

Authentication and Security in Mobile Phones

Lecture 6 - Cryptography

Application Security: Threats and Architecture

Name: 1. CSE331: Introduction to Networks and Security Fall 2003 Dec. 12, /14 2 /16 3 /16 4 /10 5 /14 6 /5 7 /5 8 /20 9 /35.

Hardware Security Modules for Protecting Embedded Systems

Caught in the Maze of Security Standards

White paper. Why Encrypt? Securing without compromising communications

Public Key Cryptography in Practice. c Eli Biham - May 3, Public Key Cryptography in Practice (13)

Brazosport College VPN Connection Installation and Setup Instructions. Draft 2 March 24, 2005

Communication Security for Applications

APPLYING FORMAL METHODS TO CRYPTOGRAPHIC PROTOCOL ANALYSIS: EMERGING ISSUES AND TRENDS

CSci 530 Midterm Exam. Fall 2012

EECS 588: Computer and Network Security. Introduction January 14, 2014

Critical Skills Interview

Transcription:

Cryptography for Software and Web Developers Part 5: Don t believe the crypto hype Hanno Böck 2014-05-28 1 / 10

The NSA scandal was the biggest boost for snake oil crypto of all time Threema, Telegram, Cryptocat, whistle.im, chiffry, tutanota, myenigma, Hike, Kontalk,... 2 / 10

At the moment a lot of people will try to sell you the latest easy-to-use super-secure crypto solution In most cases these should not be considered trustworthy 3 / 10

Telegram has a contest: They ll pay you $ 200.000 if you can decrypt their sample messages Sounds good, right? But it only applies to passive attacks. No sidechannels, authentication issues, software bugs like buffer overflows, known-plaintext-attacks,... Moxie Marlinspike challenged the Telegram developers with a similar contest by defining a completely insecure protocol. They haven t responded. 4 / 10

Threema is proprietary But they provide a validation feature: App can log data packages and a small tool that s available in source form can verify if that s really the message encrypted with the corresponding private key How do you know if the logged package is the same that was sent? How do you know they don t embed secret data in the nonce? You just don t. The whole Threema validation is a scam. 5 / 10

We really could need some better crypto message systems Some people will tell you: What s the matter, we have PGP and Jabber with OTR, that s all you need Except that they re mostly unusable for normal users and have tons of strange properties PGP doesn t encrypt the Subject, has two modes where only one protects certain metadata, doesn t provide forward secrecy OTR only works if your communication partner is online, else it will be unencrypted 6 / 10

From everything I ve seen lately there are only two systems I find interesting: Pond and Textsecure Free software, source available Well documented strong crypto technologies that seem to make sense Created by people who know a lot about crypto 7 / 10

I find it hard to believe, but this is a real problem E-Mail Made in Germany, SecurITy made in Germany / TeleTrusT etc. Peter Tauber (member of german parliament, CDU) wants german encryption Recently got a mail proposing a secure chat and phone system that uses german elliptic curves with 512 bit. (I assume they mean the Brainpool curves, however Brainpool has no curve with 512 bit) Don t use AES, it s a US-standard from the NSA - except that it has been created by researchers from Belgium 8 / 10

Crypto is good when it has been created in a trustworthy process It doesn t matter what kind of passport the researcher / developer creating the system has And finally: Be aware that Germany does not have a lot of high profile cryptographers. 9 / 10

Some reasonable questions you may ask: Crypto is hard. Do you have a crypto expert in your development team or has your software been reviewed by a crypto expert? Can I see the tecchnical details of the protocol? Can I see the source code? If the answer to any of these is No just ignore it 10 / 10

TextSecure https://whispersystems.org/ Pond https://pond.imperialviolet.org/ 11 / 10