Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cryptographic bugs in RF encryption

Sponsored · Your Podcast. Everywhere. Effortlessly. Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
Avatar for Nazar Nazar
December 05, 2022

Cryptographic bugs in RF encryption

Review of cryptographic vulnerabilities in a tiny system with encrypted radio-frequency communication.

Avatar for Nazar

Nazar

December 05, 2022
Tweet

Other Decks in Programming

Transcript

  1. Introduction Small system, ridiculous number of cryptographic bugs. Very popular,

    recommended by official vendor, +200 forks on GitHub
  2. —Someone Famous “In the CBC mode, the IV should be

    unpredictable but not secret, and differ from message to message. But bro, just use AES-GCM.”
  3. CBC Padding Oracle attack 02 “I have a couple of

    questions…” Cool padding bro
  4. ERROR CORRECTION CODE • Military grade 96, 128-bit • Requires

    secret key • Detects any change • Too small (16, 32 bits) • Easy to compute • Malleable MAC CRC-16 MESSAGE AUTHENTICATION CODE
  5. Even if data is encrypted, it still can be used

    to trigger some processing again. In a nutshell
  6. Use integrity protection 01 Say no to oracle and malleability

    attacks! Understand security requirements 02 Make CTR and GCM nonce unique, CBC IV unpredictable Use AEAD 03 AES-GCM or ChaCha-Poly1305 are your friends Build accurate threat model 04 And even better, hire someone who can Educate developers 05 Even Google has bad examples
  7. CREDITS: This presentation template was created by Slidesgo, and includes

    icons by Flaticon, and infographics & images by Freepik Thanks! Do you have any questions? [email protected] https://www.linkedin.com/in/nazar-serhiichuk-17086821b