Home / Series / Chaos Communication Congress / Aired Order / Season 31 / Episode 51

Finding the Weak Crypto Needle in a Byte Haystack (#6144)

Speaker: Ben H. Using the same stream cipher key twice is known to be a Very Bad Idea, but keystream-resuse vulnerabilities are still very much a thing of the present - both in legitimate software and in the malware landscape. We describe a heuristic algorithm which can detect vulnerabilities of this kind. We explain the inner workings of the algorithm and demonstrate a proof-of-concept attack on sevreral examples of vulnerable data, including files encrypted by the DirCrypt malware and encrypted traffic generated by malware such as variants of Zeus and Ramnit.

English
  • Originally Aired December 28, 2014
  • Runtime 60 minutes
  • Created December 29, 2014 by
    Administrator admin
  • Modified December 29, 2014 by
    Administrator admin