首页> 外文会议>Cryptology and Network Security; Lecture Notes in Computer Science; 4301 >Stealing Secrets with SSL/TLS and SSH-Kleptographic Attacks
【24h】

Stealing Secrets with SSL/TLS and SSH-Kleptographic Attacks

机译:通过SSL / TLS和SSH密码学攻击来窃取秘密

获取原文
获取原文并翻译 | 示例

摘要

We present very simple kleptographic attacks on SSL/TLS and SSH protocols. They enable a party, which has slightly manipulated the code of a cryptographic library, to steal secrets of the user. According to the scenario of the kleptographic attacks the secrets can be stolen only by a party having a secret key not included in the manipulated code. The attacker needs only to record transmissions. The messages transmitted are indistinguishable from the not manipulated ones (even for somebody that knows the kleptocode inserted). Therefore, detection of infected nodes based on communication analysis is much harder than in the case of classical subliminal channels. The problems are caused by certain design features of SSL/TLS and SSH protocols that make them vulnerable for a kleptographic attack. We propose changes of these protocols that make them immune against this threat while all previous security features remain preserved.
机译:我们介绍了针对SSL / TLS和SSH协议的非常简单的窃贼攻击。它们使已稍微操纵密码库代码的一方窃取用户的秘密。根据窃贼袭击的情况,秘密只能由具有未包含在操纵代码中的秘密钥匙的一方窃取。攻击者只需要记录传输。所传输的消息与未经处理的消息是无法区分的(即使对于知道已插入kleptocode的人而言)。因此,与传统的潜意识通道相比,基于通信分析的感染节点检测要困难得多。这些问题是由SSL / TLS和SSH协议的某些设计功能引起的,这些功能使它们很容易受到欺诈攻击。我们建议对这些协议进行更改,使它们不受此威胁的影响,同时保留所有以前的安全功能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号