+ All Categories
Home > Documents > Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data...

Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data...

Date post: 25-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
51
Mathy Vanhoef Public PhD Defense A Security Analysis of the WPA- TKIP and TLS Security Protocols
Transcript
Page 1: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Mathy Vanhoef

Public PhD Defense

A Security Analysis of the WPA-TKIP and TLS Security Protocols

Page 2: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Data handled by computers:

2

Banking details Emails Messaging

Adult websites Mobile devicesPrivate files

Page 3: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Goal of dissertation

3

Is the transmission of this data properly protected?

Page 4: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

How is data transmitted?

4

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 5: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

How is data transmitted?

5

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 6: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Wireless network security

6

Easy to intercept transmitted data

Computer

Wireless router

Solution: pick password and use encryption!

Page 7: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Available cipher suites?

7

1999 2003 2004

WEP WPA-TKIP AES-CCMP

Page 8: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Available cipher suites?

8

1999 2003 2004

WEP

Broken

WPA-TKIP

Acceptable

AES-CCMP

Secure

Page 9: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Is WPA-TKIP still used?

Usage in 2013:

66% support TKIP

19% support only TKIP

9

Need more arguments to kill TKIP!

Page 10: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Is WPA-TKIP still used?

Usage in 2016:

59% support TKIP

3% support only TKIP

10

Need more arguments to kill TKIP!

Page 11: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Discovered new attacks

11

1. Efficient Denial of Service

2. Forge arbitrary packets to client

3. Decrypt traffic towards client

In 2016, 59% of networks

still are vulnerable!

Page 12: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Impact of attack

12

Computer

Wireless

router

Website

2.2.2.2

Where is detijd.be?

unique address for

every computer

Page 13: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Impact of attack

13

Computer

Wireless

router

Website

2.2.2.2

detijd.be is at 2.2.2.2

unique address for

every computer

Page 14: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Impact of attack

14

Computer

Wireless

router

Website

2.2.2.2

Load detijd.be

Page 15: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Impact of attack

15

Computer

Wireless

router

Attacker

4.4.4.4

Website

2.2.2.2

detijd.be is at 4.4.4.4

Load detijd.be

Page 16: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Impact of attack

16

Computer

Wireless

router

Attacker

4.4.4.4

Website

2.2.2.2

detijd.be is at 4.4.4.4

Victim now contacts

attacker to load detijd.be

Load detijd.be

Page 17: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Conclusion

17

Use only AES-CCMP!

Page 18: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

How is data transmitted?

18

Computer

Study security of network protocols used at:

1. Your wireless network

2. Your internet connection

ServerWireless

router

Page 19: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Securing internet traffic

19

Websites can be secured using HTTPS

HTTPS is based on TLS

Internally TLS can use AES, RC4,…

Which one is widely used? Is it secure?

Page 20: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Is RC4 still used?

20

50%

30%

13%

0%

10%

20%

30%

40%

50%

60%

March 2013 Februari 2015 July 2015

In 2013 half of all TLS connections used RC4

Page 21: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

RC4 encryption

21

Plaintext

Ciphertext

Keystream

RC4

Key Password123!

RC4

56, 0, 234, 102, 41, …

Page 22: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

RC4 encryption

22

Password123! RC4 56, 0, 234, 102, …

The numbers (keystream) should be random

Not the case for RC4 due to biases!

Page 23: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

RC4 encryption

23

Password123! RC4 56, 0, 234, 102, …

The numbers (keystream) should be random

Not the case for RC4 due to biases!

Page 24: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Why is this bad?

24

Imagine only second keystream byte is used

When is zero is ‘rolled’, no encryption occurs

Most frequent ciphertextbyte is the real value

Page 25: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

25

Page 26: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

26

After encryption, image

is unrecognizable

Page 27: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

27

?

RC4 biases Most frequent

pixel value is the real value

Page 28: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

28

?

Replace all pixels in block

with most frequent value!

Page 29: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

29

Try to recover rough outline

using bigger blocks?

Page 30: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

30

Try to recover rough outline

using bigger blocks?

Page 31: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

31

Page 32: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

32

Page 33: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

33

Page 34: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Capture multiple encryptions!

Combine with biases to recover all info:

How to recover details?

34

Page 35: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

35

Page 36: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

36

Page 37: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

37

Page 38: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

38

Page 39: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

39

Page 40: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Capture multiple encryptions:

Combine with biases to recover all info:

How to recover details?

40

Page 41: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Summary: abusing RC4 biases

41

EncryptionMultiple

EncryptionsUse Biases

Page 42: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Our contributions

42

We improved these techniques by:

Also using other biases

Generating a list of plaintext candidates

Rapidly generating multiple encryptions

Using this we decrypt a HTTPS cookie.

Page 43: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Cookies are unique identifiers

43

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Browser Facebook

Page 44: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Cookies are unique identifiers

44

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Return newsfeed of

Mathy Vanhoef

Browser Facebook

Page 45: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Cookies are unique identifiers

45

Cookie Identity

ae637f8c5 Mathy

… …

Get newsfeed

Cookie: ae637f8c5

Return newsfeed of

Mathy Vanhoef

Browser Facebook

Included in

all requests

Page 46: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Decrypting the cookie

46

Browser Facebook Attacker

Cookie:

ae637f8c5

Generate many requests, use biases to recover the cookie!

……

Cookie: …

Cookie: …

Cookie: …

Page 47: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Decrypting 16-character cookie

47

Need one billion encryptions of cookie

Ciphertext copies times 227

Page 48: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Decrypting 16-character cookie

48

Need one billion encryptions of cookie

Takes 75 hours with 4450 requests /

second

Ciphertext copies times 227

Page 49: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Practical impact

49

In response, browsers disabled RC4:

Chrome: dropped support in v48 (20 Jan. 2016)

Firefox: dropped support in v44 (26 Jan. 2016)

IE11: supports RC4

Edge: supports RC4

“will be disabled in forthcoming update”

Page 50: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Decrypting Cookies

50

Page 51: Mathy VanhoefPublic PhD Defense A Security Analysis of the WPA-TKIP and TLS Security Protocols. Data handled by computers: 2 Banking details Emails Messaging Adult websites Private

Questions?


Recommended