SlideShare a Scribd company logo
Podmokov E.V.
Go to TLS:
information security
specialist's
view
1
Agenda
• History
• What’s it ?
• Two levels of TLS
• Security
• TLS 1.3
2
History
SSL 1.0-3.0 (…-1996)
TLS 1.0 or SSL 3.1 (1999)
TLS 1.1 (2006)
TLS 1.2 (2008)
TLS 1.3 (2017!?)
tlswg.github.io/tls13-spec
3
The Transport Layer Security protocol aims primarily to provide privacy and
data integrity between two communicating computer applications.
The connection is private (or secure) because symmetric cryptography is
used to encrypt the data transmitted. The keys for this symmetric encryption
are generated uniquely for each connection and are based on a shared secret
negotiated at the start of the session (see TLS handshake protocol). The server
and client negotiate the details of which encryption algorithm and
cryptographic keys to use before the first byte of data is transmitted (see
Algorithm below). The negotiation of a shared secret is both secure (the
negotiated secret is unavailable to eavesdroppers and cannot be obtained,
even by an attacker who places themselves in the middle of the connection)
and reliable (no attacker can modify the communications during the
negotiation without being detected).
The identity of the communicating parties can be authenticated using public-
key cryptography. This authentication can be made optional, but is generally
required for at least one of the parties (typically the server).
The connection ensures integrity because each message transmitted
includes a message integrity check using a message authentication code to
prevent undetected loss or alteration of the data during transmission.
What’s it ?
4
What’s it ?
App
Presentation
Session
Phy
Transport
Network
Data Link
TLS Higher handshake layer
Lower recording layer
5
Recording
6
Handshake
Client Server
7
Reconnection
Client Server
8
Client Server
False Start
9
Other
• ChangeCipherSpec
• Alert
• Application Data
10
Certificate Authority
@babayota_kun: habrahabr.ru/post/258285
Chain of trust
Certificate Revocation List
OCSP
11
TLS with ГОСТ
• ГОСТ Р 34.10-2012 (RFC 7091)
electronic digital signature
• ГОСТ Р 34.11-2012 (RFC 6986) hash
tc26.ru 12
BEAST TLS 1.0
Browser Exploit Against SSL/TLS
Main algo with CBC
Ci = E(Key, Mi xor Ci-1)
If all msg is equal
M1 = Ci-1 xor IV xor P
C1 = E(Key, M1 xor IV) =
= E(Key, (Ci-1 xor IV xor P) xor IV) =
= E(Key, (Ci-1 xor P)) == Сi
13
BEAST TLS 1.0
msg segmentation to blocks
[login: *][*******] [*******] …
14
CRIME TLS 1.0-1.1
nccgroup.trust/us/about-us/newsroom-and-events/blog/2012/september/
details-on-the-crime-attack/ 15
BREACH
blackhat.com/us-13/briefings.html#Prado
MS Outlook WEB Access
GET /owa/?ae=Item&t=IPM.Note&a=New&id=
canary=<guess>
<span
id=requestUrl>https://malbot.net:443/owa/forms/
basic/BasicEditMessage.aspx?ae=Item&amp;t=IPM.Note
&amp;a=New&amp;id=canary=<guess>
</span>
...
<td nowrap id="tdErrLgf"><a
href="logoff.owa?canary=d634cda866f14c73ac135ae85
8c0d894">LogOff</a></td>
Token CSRF
16
Lucky-13 TLS 1.0-1.2
Padding-oracle based
cryptopro.ru/blog/2013/02/19/kriptopro-tls-protiv-schastlivogo-chisla-13 17
Heartbleed
• OpenSSL CVE-2014-0160
18
19
20
21
Others
FREAK & Logjam
POODLE (Padding Oracle On Downgraded
Legacy Encryption) - MITM
Sweet32
DROWN (Decrypting RSA with Obsolete and
Weakened eNcryption)
THC-SSL-DOS
….
22
TLS 1.3
• Not compatible to 1.2
• New handshake
• 0-RTT (round-trip time)
• metadata
23
Links
• TLS 1.3 tlswg.github.io/tls13-spec
• TLS details tls.dxdt.ru/tls.html
• DEV literature
blog.cloudflare.com/introducing-tls-1-3
• Network
blog.fourthbit.com/2014/12/23/traffic-
analysis-of-an-ssl-slash-tls-session
24

More Related Content

PPTX
Transport layer security (tls)
PDF
Transport Layer Security - Mrinal Wadhwa
PPTX
SSL/TLS 101
PDF
Transport Layer Security
PPT
Secure Sockets Layer and Transport Layer Security
PPTX
All you need to know about transport layer security
PPTX
Transport layer security
PPTX
TLS - Transport Layer Security
Transport layer security (tls)
Transport Layer Security - Mrinal Wadhwa
SSL/TLS 101
Transport Layer Security
Secure Sockets Layer and Transport Layer Security
All you need to know about transport layer security
Transport layer security
TLS - Transport Layer Security

What's hot (20)

PPTX
SSL/TLS
PPTX
Introduction to SSL and How to Exploit & Secure
PDF
wolfSSL and TLS 1.3
PPTX
Transport layer security
PPT
SSL Secure Socket Layer
PDF
wolfSSL TLS 1.3 Support in 2018
PPT
Introduction to Secure Sockets Layer
PPT
security in transport layer ssl
PPTX
Transport Layer Security
PPTX
Transport Layer Security
PPTX
SSL And TLS
PPTX
SSL Layer
PPSX
Secure socket layer
PPT
Ssl (Secure Sockets Layer)
PPTX
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
PPTX
Sequere socket Layer
PPTX
Ssl and tls
PPTX
Secure Socket Layer
PPTX
SSL TLS Protocol
PPTX
secure socket layer
SSL/TLS
Introduction to SSL and How to Exploit & Secure
wolfSSL and TLS 1.3
Transport layer security
SSL Secure Socket Layer
wolfSSL TLS 1.3 Support in 2018
Introduction to Secure Sockets Layer
security in transport layer ssl
Transport Layer Security
Transport Layer Security
SSL And TLS
SSL Layer
Secure socket layer
Ssl (Secure Sockets Layer)
BlueHat v17 || TLS 1.3 - Full speed ahead... mind the warnings - the great, t...
Sequere socket Layer
Ssl and tls
Secure Socket Layer
SSL TLS Protocol
secure socket layer
Ad

Similar to Egor Podmokov - TLS from security point of view (20)

PDF
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
PPT
cryptography and network security thid.ppt
PDF
TLS Perf: from three to zero in one spec
PPTX
Transport Layer Security (TLS)
PDF
CNIT 141: 13. TLS
PPTX
ssl-tls-ipsec-vpn.pptx
DOCX
Transport Layer Security
ODP
Tls 1.3
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PPTX
Cours4.pptx
PDF
CNIT 141 13. TLS
PPT
Transport layer security.ppt
PPTX
TLS v1.3
DOCX
What is TLS/SSL?
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
PPTX
ION Sri Lanka - TLS for Network Operators
PDF
ip security
PPTX
Secure socket layer
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
cryptography and network security thid.ppt
TLS Perf: from three to zero in one spec
Transport Layer Security (TLS)
CNIT 141: 13. TLS
ssl-tls-ipsec-vpn.pptx
Transport Layer Security
Tls 1.3
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Cours4.pptx
CNIT 141 13. TLS
Transport layer security.ppt
TLS v1.3
What is TLS/SSL?
SECURE SOCKET LAYER ( WEB SECURITY )
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
Module2 PPrwgerbetytbteynyunyunythyhtyT.pptx
ION Sri Lanka - TLS for Network Operators
ip security
Secure socket layer
Ad

Recently uploaded (20)

PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPT
Total quality management ppt for engineering students
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
737-MAX_SRG.pdf student reference guides
PDF
86236642-Electric-Loco-Shed.pdf jfkduklg
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Information Storage and Retrieval Techniques Unit III
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PPT
introduction to datamining and warehousing
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
Visual Aids for Exploratory Data Analysis.pdf
PPTX
communication and presentation skills 01
PDF
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
Safety Seminar civil to be ensured for safe working.
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Total quality management ppt for engineering students
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
737-MAX_SRG.pdf student reference guides
86236642-Electric-Loco-Shed.pdf jfkduklg
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
R24 SURVEYING LAB MANUAL for civil enggi
Information Storage and Retrieval Techniques Unit III
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
Categorization of Factors Affecting Classification Algorithms Selection
introduction to datamining and warehousing
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Visual Aids for Exploratory Data Analysis.pdf
communication and presentation skills 01
BIO-INSPIRED ARCHITECTURE FOR PARSIMONIOUS CONVERSATIONAL INTELLIGENCE : THE ...
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
Safety Seminar civil to be ensured for safe working.

Egor Podmokov - TLS from security point of view

Editor's Notes

  • #16: https://docs.google.com/presentation/d/11eBmGiHbYcHR9gL5nDyZChu_-lCa2GizeuOfaLU2HOU/edit#slide=id.g1d134dff_1_152
  • #17: https://www.blackhat.com/us-13/briefings.html#Prado http://breachattack.com/resources/BREACH%20-%20SSL,%20gone%20in%2030%20seconds.pdf https://www.djangoproject.com/weblog/2013/aug/06/breach-and-django/
  • #18: ietf.org/proceedings/89/slides/slides-89-irtfopen-1.pdf users.wpi.edu/~teisenbarth/pdf/Lucky13%20AsiaCCS2015.pdf
  • #19: http://heartbleed.com/