26C3 - 26C3 1.15
26th Chaos Communication Congress
Here be dragons
Speakers | |
---|---|
Philippe Oechslin |
Schedule | |
---|---|
Day | Day 1 - 2009-12-27 |
Room | Saal1 |
Start time | 18:30 |
Duration | 01:00 |
Info | |
ID | 3703 |
Event type | Lecture |
Track | Hacking |
Language used for presentation | English |
Feedback | |
---|---|
Did you attend this event? Give Feedback |
Exposing Crypto Bugs through reverse engineering
Breaking good crypto is hard. It takes a genius to find a flaw in AES or Blowfish. On the other hand, it is also difficult to program cryptography correctly. Thus the simpler way of breaking a cryptographic software is often to reverse engineer it and find the crypto errors that were made by the programmers.
In this talk the simple errors will be demonstrated that were discovered when reverse engineering three products for evaluation or forensic purposes. In each case, a simple error gave access to information that was supposed to be protected by the best crypto algorithms.
The demos will be the following:
- the FIPS 142-3 level 2 certified MXI stealth USB key (before it got patched)
- a version of the E-capsule private safe from EISST
- Data Beckers now defunct Private Safe software