skip to main content
10.1145/2810103.2813657acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption

Published: 12 October 2015 Publication History
  • Get Citation Alerts
  • Abstract

    Encrypted key transport with RSA-PKCS#1 v1.5 is the most commonly deployed key exchange method in all current versions of the Transport Layer Security (TLS) protocol, including the most recent version 1.2. However, it has several well-known issues, most importantly that it does not provide forward secrecy, and that it is prone to side channel attacks that may enable an attacker to learn the session key used for a TLS session. A long history of attacks shows that RSA-PKCS#1 v1.5 is extremely difficult to implement securely. The current draft of TLS version 1.3 dispenses with this encrypted key transport method. But is this sufficient to protect against weaknesses in RSA-PKCS#1 v1.5?
    We describe attacks which transfer the potential weakness of prior TLS versions to two recently proposed protocols that do not even support PKCS#1 v1.5 encryption, namely Google's QUIC protocol and TLS~1.3. These attacks enable an attacker to impersonate a server by using a vulnerable TLS-RSA server implementation as a "signing oracle" to compute valid signatures for messages chosen by the attacker.
    The first attack (on TLS 1.3) requires a very fast "Bleichenbacher-oracle" to create the TLS CertificateVerify message before the client drops the connection. Even though this limits the practical impact of this attack, it demonstrates that simply removing a legacy algorithm from a standard is not necessarily sufficient to protect against its weaknesses.
    The second attack on Google's QUIC protocol is much more practical. It can also be applied in settings where forging a signature with the help of a "Bleichenbacher-oracle" may take an extremely long time. This is because signed values in QUIC are independent of the client's connection request. Therefore the attacker is able to pre-compute the signature long before the client starts a connection. This makes the attack practical. Moreover, the impact on QUIC is much more dramatic, because creating a single forged signature is essentially equivalent to retrieving the long-term secret key of the server.

    References

    [1]
    SSL Pulse. Survey of the SSL Implementation of the Most Popular Web Sites, April 2015. https://www.trustworthyinternet.org/ssl-pulse.
    [2]
    David Adrian, Karthikeyan Bhargavan, Zakir Durumeric, Pierrick Gaudry, Matthew Green,J. Alex Halderman, Nadia Heninger, Drew Springall, Emmanuel Thomé, Luke Valenta,Benjamin VanderSloot, Eric Wustrow, Santiago Zanella-Béguelin, Paul Zimmermann. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. May 2015. https://WeakDH.org
    [3]
    Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors. ACM CCS 14: 21st Conference on Computer and Communications Security. ACM Press, November 2014.
    [4]
    Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, and Joe-Kai Tsay. Efficient padding oracle attacks on cryptographic hardware. In Reihaneh Safavi-Naini and Ran Canetti, editors, Advances in Cryptology -- CRYPTO 2012, volume 7417 of Lecture Notes in Computer Science, pages 608--625. Springer, August 2012.
    [5]
    Florian Bergsma, Benjamin Dowling, Florian Kohlar, Jörg Schwenk, and Douglas Stebila. Multi-ciphersuite security of the secure shell (SSH) protocol. In Ahn et al.citeCCS14, pages 369--381.
    [6]
    S. Blake-Wilson, N. Bolyard, V. Gupta, C. Hawk, and B. Moeller. Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 4492 (Informational), May 2006. Updated by RFC 5246.
    [7]
    Daniel Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1. In Hugo Krawczyk, editor, Advances in Cryptology -- CRYPTO'98, volume 1462 of Lecture Notes in Computer Science, pages 1--12. Springer, August 1998.
    [8]
    Wan-Teh Chang and Adam Langley. QUIC crypto, 2013. https://docs.google.com/document/d/1g5nIXAIkN_Y-7XJW5K45IblHd_L2f5LTaDUDwvZ5L6g/edit?pli=1.
    [9]
    Jean Paul Degabriele, Anja Lehmann, Kenneth G. Paterson, Nigel P. Smart, and Mario Strefler. On the joint security of encryption and signature in EMV. In Orr Dunkelman, editor, Topics in Cryptology -- CT-RSA 2012, volume 7178 of Lecture Notes in Computer Science, pages 116--135. Springer, February / March 2012.
    [10]
    T. Dierks and C. Allen. The TLS Protocol Version 1.0. RFC 2246 (Proposed Standard), January 1999. Obsoleted by RFC 4346, updated by RFCs 3546, 5746.
    [11]
    T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.1. RFC 4346 (Proposed Standard), April 2006. Obsoleted by RFC 5246, updated by RFCs 4366, 4680, 4681, 5746.
    [12]
    T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008. Updated by RFC 5746.
    [13]
    T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. draft-ietf-tls-tls13-07, July 2015.
    [14]
    Marc Fischlin and Felix Günther. Multi-stage key exchange and the case of google's QUIC protocol. In Gail-Joon Ahn, Moti Yung, and Ninghui Li, editors, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3--7, 2014, pages 1193--1204. ACM, 2014.
    [15]
    Martin Georgiev, Subodh Iyengar, Suman Jana, Rishita Anubhai, Dan Boneh, and Vitaly Shmatikov. The Most Dangerous Code in the World: Validating SSL Certificates in Non-Browser Software. In ACM Conference on Computer and Communications Security, 2012.
    [16]
    Fedor Indutny. Rsa certificate sizes, April 2015. http://indutny.github.io/collect-certs.
    [17]
    Tibor Jager, Kenneth G. Paterson, and Juraj Somorovsky. One bad apple: Backwards compatibility attacks on state-of-the-art cryptography. In ISOC Network and Distributed System Security Symposium -- NDSS 2013. The Internet Society, February 2013.
    [18]
    Tibor Jager, Sebastian Schinzel, and Juraj Somorovsky. Bleichenbacher's attack strikes again: Breaking PKCS#1 v1.5 in XML encryption. In Sara Foresti, Moti Yung, and Fabio Martinelli, editors, ESORICS 2012: 17th European Symposium on Research in Computer Security, volume 7459 of Lecture Notes in Computer Science, pages 752--769. Springer, September 2012.
    [19]
    J. Jonsson and B. Kaliski. Public-Key Cryptography Standards (PKCS)#1: RSA Cryptography Specifications Version 2.1. RFC 3447 (Informational), February 2003.
    [20]
    B. Kaliski. PKCS#1: RSA Encryption Version 1.5. RFC 2313 (Informational), March 1998. Obsoleted by RFC 2437.
    [21]
    B. Kaliski and J. Staddon. PKCS#1: RSA Cryptography Specifications Version 2.0. RFC 2437 (Informational), October 1998. Obsoleted by RFC 3447.
    [22]
    Vlastimil Klıma, Ondrej Pokorný, and Tomás Rosa. Attacking RSA-based sessions in SSL/TLS. In Colin D. Walter, Çetin Kaya Koç, and Christof Paar, editors, Cryptographic Hardware and Embedded Systems -- CHES 2003, volume 2779 of Lecture Notes in Computer Science, pages 426--440. Springer, September 2003.
    [23]
    Robert Lychev, Samuel Jero, Alexandra Boldyreva, and Cristina Nita-Rotaru. How secure and quick is QUIC? Provable security and performance analyses. In 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17--21, 2015, pages 214--231. IEEE Computer Society, 2015.
    [24]
    M. Maher. ATM Signalling Support for IP over ATM - UNI Signalling 4.0 Update. RFC 2331 (Proposed Standard), April 1998.
    [25]
    James Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS#1 v2.0. In Joe Kilian, editor, Advances in Cryptology -- CRYPTO 2001, volume 2139 of Lecture Notes in Computer Science, pages 230--238. Springer, August 2001.
    [26]
    Nikos Mavrogiannopoulos, Frederik Vercauteren, Vesselin Velichkov, and Bart Preneel. A cross-protocol attack on the TLS protocol. In Yu et al. CCS12, pages 62--72.
    [27]
    Christopher Meyer and Jörg Schwenk. SoK: Lessons Learned From SSL/TLS Attacks. In Proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, Berlin, Heidelberg, August 2013. Springer-Verlag.
    [28]
    Christopher Meyer, Juraj Somorovsky, Eugen Weiss, Jörg Schwenk, Sebastian Schinzel, and Erik Tews. Revisiting SSL/TLS implementations: New bleichenbacher side channels and attacks. In Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20--22, 2014., pages 733--748, 2014.
    [29]
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In Ehab Al-Shaer, Somesh Jha, and Angelos D. Keromytis, editors, ACM CCS 09: 16th Conference on Computer and Communications Security, pages 199--212. ACM Press, November 2009.
    [30]
    Ivan Ristić. Bulletproof SSL and TLS. Understanding and deploying SSL/TLS and PKI to secure servers and web applications. Feisty Duck, August 2014.
    [31]
    Jim Roskind. Experimenting with QUIC, 2013. http://blog.chromium.org/2013/06/experimenting-with-quic.html.
    [32]
    Jim Roskind. QUIC design document, 2013. https://docs.google.com/a/chromium.org/document/d/1RNHkx_VvKWyWg6Lr8SZ-saqsQx7rFV-ev2jRFUoVD34.
    [33]
    D. Wagner and B. Schneier. Analysis of the SSL 3.0 protocol. The Second USENIX Workshop on Electronic Commerce Proceedings, 1996.
    [34]
    Ting Yu, George Danezis, and Virgil D. Gligor, editors. ACM CCS 12: 19th Conference on Computer and Communications Security. ACM Press, October 2012.
    [35]
    Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. Cross-VM side channels and their use to extract private keys. In Yu et al. CCS12, pages 305--316.
    [36]
    Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. Cross-tenant side-channel attacks in PaaS clouds. In Ahn et al. CCS14, pages 990--1003.

    Cited By

    View all
    • (2024)Customized model for text cryptography using hybrid image-keySignal, Image and Video Processing10.1007/s11760-024-03208-y18:S1(965-978)Online publication date: 22-May-2024
    • (2023)Formal analysis of SPDMProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620607(6611-6628)Online publication date: 9-Aug-2023
    • (2023)Back to schoolProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620558(5737-5754)Online publication date: 9-Aug-2023
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
    October 2015
    1750 pages
    ISBN:9781450338325
    DOI:10.1145/2810103
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 October 2015

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. TLS
    2. chosen-ciphertext attack
    3. cross-protocol attack

    Qualifiers

    • Research-article

    Conference

    CCS'15
    Sponsor:

    Acceptance Rates

    CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '24
    ACM SIGSAC Conference on Computer and Communications Security
    October 14 - 18, 2024
    Salt Lake City , UT , USA

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)136
    • Downloads (Last 6 weeks)16

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Customized model for text cryptography using hybrid image-keySignal, Image and Video Processing10.1007/s11760-024-03208-y18:S1(965-978)Online publication date: 22-May-2024
    • (2023)Formal analysis of SPDMProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620607(6611-6628)Online publication date: 9-Aug-2023
    • (2023)Back to schoolProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620558(5737-5754)Online publication date: 9-Aug-2023
    • (2022)Towards post-quantum security for cyber-physical systemsJournal of Computer Security10.3233/JCS-21003730:4(623-653)Online publication date: 1-Jan-2022
    • (2022)Security Review and Performance Analysis of QUIC and TCP Protocols2022 15th International Conference on Information Security and Cryptography (ISCTURKEY)10.1109/ISCTURKEY56345.2022.9931821(25-30)Online publication date: 19-Oct-2022
    • (2022)An QUIC Traffic Anomaly Detection Model Based on Empirical Mode Decomposition2022 IEEE 23rd International Conference on High Performance Switching and Routing (HPSR)10.1109/HPSR54439.2022.9831335(76-80)Online publication date: 6-Jun-2022
    • (2022)Manipulated Client Initial Attack and Defense of QUIC2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00108(611-618)Online publication date: Dec-2022
    • (2022)A Survey on the Security Issues of QUIC2022 6th Cyber Security in Networking Conference (CSNet)10.1109/CSNet56116.2022.9955622(1-8)Online publication date: 24-Oct-2022
    • (2022)Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure2022 Applied Informatics International Conference (AiIC)10.1109/AiIC54368.2022.9914605(126-130)Online publication date: 18-May-2022
    • (2022)Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on studyInternational Journal of Information Security10.1007/s10207-022-00630-622:2(347-365)Online publication date: 2-Dec-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media