Fingerprinting Cryptographic Protocols with Key Exchange using an Entropy Measure

12/16/2017
by   Shoufu Luo, et al.
0

Encryption has increasingly been used in all applications for various purposes, but it also brings big challenges to network security. In this paper, we take first steps towards addressing some of these chal- lenges by introducing a novel system to identify key exchange protocols, which are usually required if encryption keys are not pre-shared. We ob- served that key exchange protocols yield certain patterns of high-entropy data blocks, e.g. as found in key material. We propose a multi-resolution approach of accurately detecting high-entropy data blocks and a method of generating scalable fingerprints for cryptographic protocols. We pro- vide experimental evidence that our approach has great potential for identifying cryptographic protocols by their unique key exchanges, and furthermore for detecting malware traffic that includes customized key exchange protocols.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/13/2021

The Inductive Approach to Verifying Cryptographic Protocols

Informal arguments that cryptographic protocols are secure can be made r...
research
12/27/2020

Towards Threshold Key Exchange Protocols

Threshold schemes exist for many cryptographic primitives like signature...
research
12/18/2022

Efficient RDMA Communication Protocols

Developers of networked systems often work with low-level RDMA libraries...
research
07/20/2021

RansomClave: Ransomware Key Management using SGX

Modern ransomware often generate and manage cryptographic keys on the vi...
research
04/23/2019

Foundations, Properties, and Security Applications of Puzzles: A Survey

Cryptographic algorithms have been used not only to create robust cipher...
research
06/16/2019

A Comprehensive Formal Security Analysis and Revision of the Two-phase Key Exchange Primitive of TPM 2.0

The Trusted Platform Module (TPM) version 2.0, which has been demonstrat...
research
07/11/2019

Entropy Estimation of Physically Unclonable Functions via Chow Parameters

A physically unclonable function (PUF) is an electronic circuit that pro...

Please sign up or login with your details

Forgot password? Click here to reset