首页> 外文OA文献 >Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS
【2h】

Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS

机译:幸运的微秒:对Amazon s2n TLS实现的定时攻击

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

s2n is an implementation of the TLS protocol that was released in late June 2015 by Amazon. It is implemented in around 6,000 lines of C99 code. By comparison, OpenSSL needs around 70,000 lines of code to implement the protocol. At the time of its release, Amazon announced that s2n had undergone three external security evaluations and penetration tests. We show that, despite this, s2n — as initially released — was vulnerable to a timing attack in the case of CBC-mode ciphersuites, which could be extended to complete plaintext recovery in some settings. Our attack has two components. The first part is a novel variant of the Lucky 13 attack that works even though protections against Lucky 13 were implemented in s2n. The second part deals with the randomised delays that were put in place in s2n as an additional countermeasure to Lucky 13. Our work highlights the challenges of protecting implementations against sophisticated timing attacks. It also illustrates that standard code audits are insufficient to uncover all cryptographic attack vectors.
机译:s2n是TLS协议的实现,该协议于2015年6月下旬由亚马逊发布。它以大约6,000行C99代码实现。相比之下,OpenSSL需要大约70,000行代码来实现该协议。在发布之时,亚马逊宣布s2n经历了三项外部安全评估和渗透测试。我们显示,尽管如此,s2n(最初发布的版本)在CBC模式密码套件的情况下容易受到定时攻击,在某些情况下可以扩展为完成纯文本恢复。我们的攻击有两个组成部分。第一部分是Lucky 13攻击的一种新颖变体,即使在s2n中实施了针对Lucky 13的保护措施,该攻击仍然有效。第二部分介绍了在s2n中设置的随机延迟,这是Lucky 13的另一种对策。我们的工作着重强调了保护实现免受复杂定时攻击的挑战。它还说明标准代码审核不足以发现所有密码攻击媒介。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号