BSides Las Vegas

SHA-1 backdooring and exploitation (2014x2)


Date de diffusion: Août 05, 2014

We've heard a lot about crypto backdoors recently (the flawed Dual_EC RNG, NIST curves and their fishy parameters, etc.). This talk presents new results on crypto backdooring, with the first published backdoor of its kind: a sabotaged version of SHA-1 that allows us to create exploitable collisions, such that we fully control the content of the colliding files: unlike theoretical "breaks" of SHA-1, our collision attacks are practical, although they use sophisticated differential attacks. We'll demonstrate PoCs of colliding binaries (MBR, COM), as well as compressed archives (RAR, 7zip) and JPEG images.

  • Classement #
  • Première: Juil 2009
  • Épisodes: 351
  • Abonnés: 0
  • Fini
  • Inconnu
  • Inconnu