650.445: PRACTICAL CRYPTOGRAPHIC SYSTEMS
650.445: PRACTICAL CRYPTOGRAPHIC SYSTEMS
The following links elaborate on topics that will be covered in lecture, as well as many topics that would make excellent presentation subjects. It’s by no means a complete list, and will be continuously updated--- if you’d like to add something, please let me know.
Protocols
• Crosby, Goldberg, Johnson, Song, Wagner: Cryptanalyzing HDCP (2001)
• Wagner, Schneier: Analysis of the SSL 3.0 Protocol
• Lucks, Schuler, Tews, Weinmann, Wenzel: Security of DECT
• Kohno: Analysis of WinZip Encryption
• Stubblefield, Ioannidis, Rubin: Breaking WEP
• Bellare, Kohno, Namprempre: Breaking and Repairing SSH
• Burrows, Abadi and Needham: A Logic of Authentication
Side Channel Attacks
• Bar-el: Introduction to Side Channel Attacks (white paper)
• Kocher: Timing attack on RSA & DL systems
• Brumley, Boneh: Remote Timing Attacks are Practical
• Bernstein: Cache Timing Attack on AES. Osvik, Shamir, Tromer: Attacks and Countermeasures
• Eisenbarth, Kasper, Moradi, Paar, Salmasizadeh, Shalmani: Attacking KeeLoq (SpringerLink)
• Shamir, Tromer: Acoustic Cryptanalysis
• Pellegrini, Bertacco, Austin: Fault-Based Attack of RSA Authentication
• Aciicmez, Koc, Seifert: Branch Prediction Analysis (very advanced)
Dictionary Attacks: Optimization & Mitigation
• Alexander: Password Protection for Modern OSes
• RSA Laboratories: PKCS #5 2.0: Password-Based Cryptography Standard
• Provos and Mazières: “Future-adaptable” password schemes
• Stamp: Once Upon a Time Space Tradeoff
• Oeschslin: Rainbow Tables (includes papers & demo)
• Canetti, Halevi, Steiner: Mitigating (offline) Dictionary Attacks with Reverse-Turing Tests
Securing Internet Infrastructure
• Jackson, Barth, Bortz, Shao, Boneh: Protecting Browsers from DNS Rebinding Attacks
• Kaminsky: It’s the End of the (DNS) Cache As We Know It (Black Hat 2008 - 101MB)
• DNSSEC.net: DNS Security Extensions (standards & resources)
• Ptacek: A case against DNSSEC
• Kent, Lynn and Seo: Secure BGP
• BBN.com: Secure BGP resources
Digital Rights Management & Conditional Access
• Lawson: Designing and Attacking DRM (presentation)
• Edwards: A technical description of the Content Scrambling System (CSS)
• Henry, Sui, Zhong: Overview of AACS --- and full AACS Specification
• ISE: A Comparison of SPDC (technology behind BD+) and AACS (2005)
• Craver, Wu, Liu, Stubblefield, Swartzlander, Wallach, Dean, Felten: Watermarking & SDMI
• Kuhn: Analysis of the Nagravision Video Scrambling Method (analog scrambling)
• Naor, Naor and Lotspiech: Revocation and Tracing Schemes for Stateless Receivers
Software, Physical Security, Backdoors
• Halderman et al.: Cold Boot Attacks on Encryption Keys & RSA Key Reconstruction
• Young, Yung: Cryptovirology: extortion-based security threats and countermeasures (IEEE)
• Dowd: Application-Specific Attacks: Leveraging the ActionScript Virtual Machine
• Steil: 17 Mistakes Microsoft Made in the XBox Security (2005)
• Bartolozzo et al.: Attacking and Fixing PKCS#11 Security Tokens
• Bardou et al.: Efficient Padding Oracle Attacks on Cryptographic Hardware
Privacy and Anonymity
• Dingledine, Mathewson, Syverson: Tor: The Second Generation Onion Router
• McCoy, Bauer, Grunwald, Kohno, Sicker: Analyzing Tor Usage
• Murdoch, Danezis: Low-cost Traffic Analysis of Tor
• Murdoch: Hot Or Not: Using clock skew to locate hidden services
• Wang, Chen, Jajodia: Tracking Anonymized VoIP Calls
Hash Functions and Random Oracles
• Coron, Dodis, Malinaud, Puniya: Merkle-Damgård Revisited
• Wang, Yu: How to break MD5 and other hash functions
• Stevens, Lenstra, de Weger: Target collisions for MD5
• Kaminsky: MD5 To Be Considered Harmful Someday
• Sotirov et al.: MD5 considered harmful today (building a rogue CA cert)
• Wang, Yin, Yu: SHA1 broken (at least, on its way...)
• NIST: “SHA3” competition: list of first round candidates (December 2008)
• Canetti, Goldreich, Halevi: Random oracles revisited, and...
• Bellare, Boldyreva, Palacio: A more natural uninstantiable Random-Oracle-Model scheme
• Coron, Patarin, Seurin: The random oracle model and the ideal cipher model are equivalent
• Bellare, Canetti, Krawczyk: HMAC
Symmetric Crypto
• Bellare, Namprempre: Authenticated encryption, generic composition
• Ferguson: Authentication weaknesses in GCM. McGrew, Viega: Response & Update.
Public Key Crypto
Bleichenbacher: CCA Attacks against Protocols (SSL) based on PKCS #1
Bellare, Rogaway: Optimal Asymmetric Encryption Padding (OAEP)
Manger: CCA Attacks against Implementations of OAEP
Bernstein: An Introduction to Post-Quantum Cryptography
Random Number Generation
• Dorrendorf, Gutterman, Pinkas: RNG Weaknesses in Windows 2000
• Gutterman, Pinkas: Flaws in the Linux RNG
• Barker, Kelsey: NIST Special Pub. 800-90: Recommendations for PRNGs
• Kelsey, Schneier, Wagner, Hall: Cryptanalytic attacks on PRNGs
• Schoenmakers, Sidorenko: Dual EC not kosher
• Shumow, Ferguson: There May Be a Backdoor in Dual EC.
• Keller: ANSI X9.31 (Block cipher-based PRNG). Various artists: FIPS 186-2 (see Appendix 3)
Implementation Issues
• Gutmann: Lessons Learned in Implementing and Deploying Crypto Software
• Berson: Security Evaluation of Skype (2005, conducted at Skype’s request)
• Biondi, Desclaux: Silver Needle in the Skype (2006, REing of Skype binary)
Financial Services
• Berkman, Ostrovsky: The Unbearable Lightness of PIN cracking
• Bond, Zieliński: Decimalisation table attacks for PIN cracking
• Murdoch, Drimer, Anderson, Bond: Chip and PIN is Broken
RFID and Wireless
• Nohl, Evans, Starbug, Plötz: Reverse-Engineering a Cryptographic RFID Tag
• Bono, Green, Stubblefield, Juels, Rubin, Szydlo: Security Analysis of TI DST Tags
Misc.
• Halperin et al.: Pacemakers and ICDs (no crypto)
• Ellis: Non-secret Encryption (historically very interesting)
• TheGrugq: Opsec for Freedom Fighters
Readings & suggested Presentation Topics