When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users

02/09/2018
by   Jeffrey Knockel, et al.
0

We evaluate Tencent's QQ Browser, a popular mobile browser in China with hundreds of millions of users---including 16 million overseas, with respect to the threat model of a man-in-the-middle attacker with state actor capabilities. This is motivated by information in the Snowden revelations suggesting that another Chinese mobile browser, UC Browser, was being used to track users by Western nation-state adversaries. Among the many issues we found in QQ Browser that are presented in this paper, the use of "textbook RSA"---that is, RSA implemented as shown in textbooks, with no padding---is particularly interesting because it affords us the opportunity to contextualize existing research in breaking textbook RSA. We also present a novel attack on QQ Browser's use of textbook RSA that is distinguished from previous research by its simplicity. We emphasize that although QQ Browser's cryptography and our attacks on it are very simple, the impact is serious. Thus, research into how to break very poor cryptography (such as textbook RSA) has both pedagogical value and real-world impact.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/02/2019

Detecting and Characterizing Lateral Phishing at Scale

We present the first large-scale characterization of lateral phishing at...
research
09/30/2021

Crypto Experts Advise What They Adopt

Previous studies have shown that developers regularly seek advice on onl...
research
07/05/2021

Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks

Cryptography techniques are essential for a robust and stable security d...
research
06/30/2021

The Threat of Offensive AI to Organizations

AI has provided us with the ability to automate tasks, extract informati...
research
01/24/2019

OAuthGuard: Protecting User Security and Privacy with OAuth 2.0 and OpenID Connect

Millions of users routinely use Google to log in to websites supporting ...
research
03/30/2023

TorKameleon: Improving Tor's Censorship Resistance With K-anonimization and Media-based Covert Channels

The use of anonymity networks such as Tor and similar tools can greatly ...
research
09/07/2020

Passwords: Divided they Stand, United they Fall

Today, offline attacks are one of the most severe threats to password se...

Please sign up or login with your details

Forgot password? Click here to reset