Certificate Authorities and Public Keys. How they work and 10+ ways to hack them.

Similar documents
Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

1. a. Define the properties of a one-way hash function. (6 marks)

Public Key Infrastructure (PKI)

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using BroadSAFE TM Technology 07/18/05

Lab 7. Answer. Figure 1

Chapter 10. Cloud Security Mechanisms

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

Digital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

PKI Uncovered. Cisco Press. Andre Karamanian Srinivas Tenneti Francois Dessart. 800 East 96th Street. Indianapolis, IN 46240

SSL/TLS: The Ugly Truth

Web Security: Encryption & Authentication

Cisco Trust Anchor Technologies

Dashlane Security Whitepaper

TLS and SRTP for Skype Connect. Technical Datasheet

Course Content Summary ITN 262 Network Communication, Security and Authentication (4 Credits)

How To Encrypt Data With Encryption

Network Security Essentials:

Client Server Registration Protocol

You re FREE Guide SSL. (Secure Sockets Layer) webvisions

Cryptography and Network Security Chapter 14. Key Distribution. Key Management and Distribution. Key Distribution Task 4/19/2010

Analysis of Secure Key Storage Solutions on Android

Instructions on TLS/SSL Certificates on Yealink Phones

Overview. SSL Cryptography Overview CHAPTER 1

Network Security (2) CPSC 441 Department of Computer Science University of Calgary

Security + Certification (ITSY 1076) Syllabus

IT Networks & Security CERT Luncheon Series: Cryptography

Cryptography and Network Security Chapter 14

DRAFT Standard Statement Encryption

OpenADR 2.0 Security. Jim Zuber, CTO QualityLogic, Inc.

Introduction to Cryptography CS 355

Chapter 17. Transport-Level Security

Research Article. Research of network payment system based on multi-factor authentication

Key Management Interoperability Protocol (KMIP)

Department of Computer & Information Sciences. CSCI-445: Computer and Network Security Syllabus

Novell ichain Guide to Installing Root Certificates, Generating CSR and Installing SSL Certificate

Lukasz Pater CMMS Administrator and Developer

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.

Curran, K. Tutorials. Independent study (including assessment) N/A

Announcement. Final exam: Wed, June 9, 9:30-11:18 Scope: materials after RSA (but you need to know RSA) Open books, open notes. Calculators allowed.

Certificates. Noah Zani, Tim Strasser, Andrés Baumeler

Secure Sockets Layer (SSL ) / Transport Layer Security (TLS) Network Security Products S31213

Savitribai Phule Pune University

Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 Phone: 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

GT 6.0 GSI C Security: Key Concepts

SWFP: Secure Web Feed Protocol

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

TLS/SSL in distributed systems. Eugen Babinciuc

Introduction to Network Security Key Management and Distribution

Bugzilla ID: Bugzilla Summary:

Internet Programming. Security

to hide away details from prying eyes. Pretty Good Privacy (PGP) utilizes many

Introduction to Cryptography

CS 161 Computer Security Spring 2010 Paxson/Wagner MT2

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

Certificates and network security

ITL BULLETIN FOR JULY Preparing for and Responding to Certification Authority Compromise and Fraudulent Certificate Issuance

Encryption, Data Integrity, Digital Certificates, and SSL. Developed by. Jerry Scott. SSL Primer-1-1

Properties of Secure Network Communication

Systematization of Knowledge Lessons Learned From SSL/TLS Attacks

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification

Why Security Matters. Why Security Matters. 00 Overview 03 Sept CSCD27 Computer and Network Security. CSCD27 Computer and Network Security 1

Midterm 2 exam solutions. Please do not read or discuss these solutions in the exam room while others are still taking the exam.

Proto Balance SSL TLS Off-Loading, Load Balancing. User Manual - SSL.

Lecture 9: Application of Cryptography

AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES

Criteria for web application security check. Version

Guide to Data Field Encryption

Installing your Digital Certificate & Using on MS Out Look 2007.

Common security requirements Basic security tools. Example. Secret-key cryptography Public-key cryptography. Online shopping with Amazon

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from

, ) I Transport Layer Security

The Information Security Problem

What Are Certificates?

HTTPS: Transport-Layer Security (TLS), aka Secure Sockets Layer (SSL)

qwertyuiopasdfghjklzxcvbnmqwertyui opasdfghjklzxcvbnmqwertyuiopasdfgh jklzxcvbnmqwertyuiopasdfghjklzxcvb

Chapter 15: Security

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

mod_ssl Cryptographic Techniques

SSL A discussion of the Secure Socket Layer

SSL DOES NOT MEAN SOL What if you don t have the server keys?

DKIM Enabled Two Factor Authenticated Secure Mail Client

Securing your Online Data Transfer with SSL

Network Security #10. Overview. Encryption Authentication Message integrity Key distribution & Certificates Secure Socket Layer (SSL) IPsec

Practice Questions. CS161 Computer Security, Fall 2008

Introduction...3 Terms in this Document...3 Conditions for Secure Operation...3 Requirements...3 Key Generation Requirements...

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Netzwerksicherheit Übung 6 SSL/TLS, OpenSSL

Transcription:

Certificate Authorities and Public Keys How they work and 10+ ways to hack them. -- FoxGuard Solutions Www.FoxGuardSolutions.com melkins@foxguardsolutions.com Version.05 9/2012 1

Certificate Use Overview 2

Symmetric Key Encryption Internet Reversible 3

Asymmetric Key Encryption Internet RSA RSA Reversible 4

RSA Algorithm 5

Hashing Non-reversible Repeatable Collision Resistant 6

Certificates- Additional Details 7

Uses of Certificates Code Signing updates Message Signing SSL /TLS https 8

Attacks 9

Attacks Against RSA RSA 10

Legitimate Signing of Malicious Code / Messages 11

Obtaining a Legitimate Signature for Someone Else via Social Engineering 12

Hacking a Registration Authority 13

Hacking the Private Key Owner 14

Bypassing Keys e.g. SSL Strip 15

Hash Collision Attacks 16

Implementation Failures 17

Addition of Certificates 18

Poor Random Number Generators 19

Social Engineering the User 20

Foreign Nation Strong Arm of CA 21

Frankenstein Style Attacks 22

Revocation List Attacks 23

Questions 24