Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Cryptographic bugs in RF encryption

Nazar
December 05, 2022

Cryptographic bugs in RF encryption

Review of cryptographic vulnerabilities in a tiny system with encrypted radio-frequency communication.

Nazar

December 05, 2022
Tweet

Other Decks in Programming

Transcript

  1. Introduction Small system, ridiculous number of cryptographic bugs. Very popular,

    recommended by official vendor, +200 forks on GitHub
  2. —Someone Famous “In the CBC mode, the IV should be

    unpredictable but not secret, and differ from message to message. But bro, just use AES-GCM.”
  3. CBC Padding Oracle attack 02 “I have a couple of

    questions…” Cool padding bro
  4. ERROR CORRECTION CODE • Military grade 96, 128-bit • Requires

    secret key • Detects any change • Too small (16, 32 bits) • Easy to compute • Malleable MAC CRC-16 MESSAGE AUTHENTICATION CODE
  5. Even if data is encrypted, it still can be used

    to trigger some processing again. In a nutshell
  6. Use integrity protection 01 Say no to oracle and malleability

    attacks! Understand security requirements 02 Make CTR and GCM nonce unique, CBC IV unpredictable Use AEAD 03 AES-GCM or ChaCha-Poly1305 are your friends Build accurate threat model 04 And even better, hire someone who can Educate developers 05 Even Google has bad examples
  7. CREDITS: This presentation template was created by Slidesgo, and includes

    icons by Flaticon, and infographics & images by Freepik Thanks! Do you have any questions? [email protected] https://www.linkedin.com/in/nazar-serhiichuk-17086821b