This document discusses misusing cryptography. It begins with an agenda covering why cryptography is misused and how random number generators and crypto algorithms can be misused. It then discusses examples of what can go wrong, such as a game developer unintentionally allowing hackers to easily determine the secret code protecting scores. The document emphasizes that cryptography is complex and should not be casually misused, as failures can result in compromises like hacked systems and lost jobs. It provides recommendations for proper cryptographic practices.
4. What can go wrong ?
n
n
(2011) A small internet company writes a
facebook game for Bezeq - winner gets an iPad
Developer had a problem
5. What can go wrong ?
n
After the game ends, he wanted to send the
score back to the server
0000000: 4e7a 1400 0000 0100 1212 33F1 5b62 4b5f Nz.......q.3[bK_"
0000010: 16ea 0b5c ff7b b6d4 7c78 f2f4 7a70 00ce ....{..|x..zp.."
0000020: c700 7cd1 93e3 8b44 e31a 32 ..|....D..2"
score
8. What can go wrong ?
n
To protect score from tampering, the developer
added a secret code that only he knew how to
calculate after the score
0000000: 4e7a 1400 0000 0100 1212 33F1 5b62 4b5f Nz.......q.3[bK_"
0000010: 16ea 0b5c ff7b b6d4 7c78 f2f4 7a70 00ce ....{..|x..zp.."
0000020: c700 7cd1 93e3 8b44 e31a 32 ..|....D..2"
Secret Code
9. What can go wrong ?
n
n
The code is different to every score
To change score, a hacker would need to
understand how to calculate the code
10. What can go wrong ?
n
n
Hackers easily found the
rules for calculating auth
code
Game broken.
Developer unemployed
11. Why You Should Care
n
Cryptography isn’t magic
n
Misuse leads to failure
12. The Problem
SSH / SSL / TLS
Stream Cipher
MD5
GCM
ECB Mode
Block Cipher
RC4
RNG
DH
SHA1 / SHA2 /
SHA3
Digital Signature
Rainbow Tables
RSA
18. Fingerprinting
n
n
Digital fingerprint is kept
using a Hash function
H(data) = unique
fingerprint
Occaecat nulla retro, before they sold out swag nesciunt in ut
sriracha jean shorts commodo aliqua velit id fugiat. Tofu plaid
Pinterest, eiusmod aesthetic selvage semiotics dreamcatcher
aliquip locavore farm-to-table meggings master cleanse odio
Bushwick. Biodiesel Williamsburg yr direct trade, pickled
dreamcatcher ethnic keffiyeh. Cliche Brooklyn nihil commodo
helvetica dolor. Church-key fanny pack hashtag VHS. Ullamco
consequat nostrud incididunt typewriter asymmetrical. Retro
aute four loko pickled tattooed Neutra.
H(...)
46a03c37c1d9b9a79a192aa84e3b9475
36. Quiz
n
n
n
Big company with
millions of subscribers
need to issue a unique
key to each
Keeping all the keys in
the DB would take too
much storage
What would you
suggest ?
60. Bug Spotting
n
The following are considered weak and should
be avoided:
n
RC4
n
MD4, MD5
n
DES, 3DES (or TripleDES)
n
ECB (For any block cipher)
78. Dual_EC_DRBG
n
Dual elliptic curve deterministic random bit
generator
n
Published in 2007, suspected with a backdoor
n
Proved by snowden’s papers