首页> 外文会议>IEEE International Conference on Industrial and Information Systems >Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack
【24h】

Implementing a proven-secure and cost-effective countermeasure against the compression ratio info-leak mass exploitation (CRIME) attack

机译:实施针对压缩率信息泄漏大规模利用(CRIME)攻击的行之有效的安全且具有成本效益的对策

获取原文

摘要

Header compression is desirable for network applications as it saves bandwidth and reduces latency. However, when data is compressed before being encrypted, the amount of compression leaks information about the amount of redundancy in the plaintext. In web requests, headers contain secret web cookies. Therefore, compression of headers before encryption will reveal the information about the secret web cookies. This side-channel has led to Compression Ratio Info-leak Made Easy (CRIME) attack on web traffic protected by the SSL/TLS protocols. In order to mitigate the CRIME attack, compression is completely disabled at the TLS/SSL layer, which in return increases the bandwidth consumption and latency. In a previous work (Financial Cryptography and Data Security 2015), two countermeasures are presented with formal security proofs, against compression side-channel attacks, namely (l)-separating secret cookies from user inputs and (2)-using a static compression dictionary. In this work we create a test environment to replicate the CRIME attack and verify the attack. Moreover, we implement a proven-secure countermeasure against the CRIME attack, in a real world client/server setup, following the aforementioned two countermeasures. Our implementation achieves better compression ratio (closer to the original TLS/SSL compression), and hence reduces the bandwidth usage and latency significantly (therefore cost-effective). To the best of our knowledge, this is the first proven-secure and cost-effective countermeasure implementation against the CRIME attack.
机译:报头压缩对于网络应用程序是理想的,因为它可以节省带宽并减少延迟。但是,当数据在加密之前被压缩时,压缩量会泄漏有关明文中冗余量的信息。在Web请求中,标头包含秘密Web Cookie。因此,在加密之前对头进行压缩将揭示有关秘密Web cookie的信息。此辅助渠道导致对受SSL / TLS协议保护的Web流量的“压缩率信息泄漏”(CRIME)攻击。为了减轻CRIME攻击,在TLS / SSL层上完全禁用了压缩,这反过来又增加了带宽消耗和延迟。在以前的工作(金融密码学和数据安全性2015)中,针对压缩侧通道攻击,提出了两种带有正式安全证明的对策,即(l)从用户输入中分离秘密cookie,以及(2)使用静态压缩字典。在这项工作中,我们创建一个测试环境来复制CRIME攻击并验证攻击。此外,我们遵循上述两个对策,在真实的客户端/服务器设置中实施了针对CRIME攻击的可靠安全对策。我们的实现实现了更好的压缩率(接近于原始的TLS / SSL压缩),因此显着减少了带宽使用和延迟(因此具有成本效益)。据我们所知,这是第一个针对CRIME攻击的行之有效的安全且具有成本效益的对策实施。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号