Skip to content
master
Go to file
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 
 
 
 
 
 
 
 
 
 
 
 
 

README.md

Nonce-Disrespecting Adversaries

We provide supplemental material to our research on AES-GCM nonce reuse vulnerabilities in TLS.

Research paper

Online check

Background

Abstract:

We investigate nonce reuse issues with the GCM block cipher mode as
used in TLS and focus in particular on AES-GCM, the most widely
deployed variant. With an Internet-wide scan we identified 184 HTTPS
servers repeating nonces, which fully breaks the authenticity of the
connections. Affected servers include large corporations, financial
institutions, and a credit card company. We present a proof of
concept of our attack allowing to violate the authenticity of affected
HTTPS connections which in turn can be utilized to inject seemingly
valid content into encrypted sessions. Furthermore, we discovered
over 70,000 HTTPS servers using random nonces, which puts them at risk
of nonce reuse, in the unlikely case that large amounts of data are
sent via the same session.

This repository provides supplemental code and information.

Code

  • getnonce - scan tool and OpenSSL patch used for our Internet-wide scan.
  • gcmproxy - attack implemented in Go.
  • tool - helper tools used by attack code.
  • paper - LaTeX source-code for IACR ePrint and WOOT16 camera-ready versions.
  • slides - presentation slides for Black Hat USA 2016 and WOOT16.

License

All our code is published as CC0 1.0 / Public Domain.

Data

Advisories

Security advisories from affected vendors:

Media / Blogs

Misc

About

Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS

Topics

Resources

License

Releases

No releases published
You can’t perform that action at this time.