cryptographic backdoors: breaking the rsa

12
CRYPTOGRAPHIC BACKDOORS: BREAKING THE RSA Adhokshaj Mishra http://adhokshajmishraonline.in

Upload: kiana

Post on 05-Jan-2016

28 views

Category:

Documents


0 download

DESCRIPTION

Cryptographic Backdoors: Breaking the RSA. Adhokshaj Mishra http://adhokshajmishraonline.in. Who am I?. A hobbyist C, C++, assembly programmer Independent Security Researcher with primary interest in cryptography, virology, crypto-virology, kleptography and mutation. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Cryptographic Backdoors: Breaking the RSA

CRYPTOGRAPHIC BACKDOORS:BREAKING THE RSA

Adhokshaj Mishra

http://adhokshajmishraonline.in

Page 2: Cryptographic Backdoors: Breaking the RSA

WHO AM I?

A hobbyist C, C++, assembly programmer Independent Security Researcher with

primary interest in cryptography, virology, crypto-virology, kleptography and mutation.

Facebook: AdhokshajMishra Twitter: @adhokshajmishra Blog: http://adhokshajmishraonline.in

Page 3: Cryptographic Backdoors: Breaking the RSA

TOPICS TO BE COVERED

RSA Revisited A Trivial RSA Backdoor Significance of PRNG Based Backdoors Backdoored PRNG for RSA Why AES + CTR? Proof of Correctness Proof of Concept (DEMO)

Page 4: Cryptographic Backdoors: Breaking the RSA

RSA REVISITED

Prime numbers: p, q N = p x q Phi = (p-1) x (q-1) e: 1 < e < Phi, gcd(e, Phi) = 1 d: (d x e) mod Phi = 1 Public Key: (N, e) Private Key: (N, d)

Page 5: Cryptographic Backdoors: Breaking the RSA

A TRIVIAL RSA BACKDOOR

RSA requires two randomly chosen prime numbers.

Keep one of them fixed for all keys :D GCD (N1, N2) = p constant Easily detectable and no forward secrecy

Page 6: Cryptographic Backdoors: Breaking the RSA

IMPROVING THE ATTACK:PRNG BASED BACKDOOR

Page 7: Cryptographic Backdoors: Breaking the RSA

WHY PRNG?

Sweet and safe spot for backdoors Backdoors become very hard to detect They don’t raise eyebrows when in use

Page 8: Cryptographic Backdoors: Breaking the RSA

PRNG BACKDOOR

Each PRNG instance contains set of parameters unique to itself.

Seed is the only input that changes with time.

Only seed is relayed to the attacker.

Page 9: Cryptographic Backdoors: Breaking the RSA

PRNG BACKDOOR DEMYSTIFIED

Page 10: Cryptographic Backdoors: Breaking the RSA

COMMON USES

PRNG is used in a lot of crypto algorithms. Backdoor the PRNG and all of them are screwed

Air-force fighter jets and Navy ships use Zero Knowledge Proofs. ZKP itself works on PRNG

PRNG backdoor can render SSL useless. Whole traffic can be recorded in plaintext, and even worse, it can be modified while in progress.

Page 11: Cryptographic Backdoors: Breaking the RSA

GOT ANY QUESTIONS?

Page 12: Cryptographic Backdoors: Breaking the RSA

THANK YOU