学位论文详细信息
Randomized Lempel-Ziv Compression for Anti-Compression Side-Channel Attacks
Lempel-Ziv compression;encryption;compression side-channel attack;randomization;TLS
Yang, Mengaffiliation1:Faculty of Engineering ; advisor:Guang, Gong ; Guang, Gong ;
University of Waterloo
关键词: compression side-channel attack;    Master Thesis;    encryption;    randomization;    Lempel-Ziv compression;    TLS;   
Others  :  https://uwspace.uwaterloo.ca/bitstream/10012/12974/3/yang_meng.pdf
瑞士|英语
来源: UWSPACE Waterloo Institutional Repository
PDF
【 摘 要 】

Security experts confront new attacks on TLS/SSL every year. Ever since the compression side-channel attacks CRIME and BREACH were presented during security conferences in 2012 and 2013, online users connecting to HTTP servers that run TLS version 1.2 are susceptible of being impersonated. We set up three Randomized Lempel-Ziv Models, which are built on Lempel-Ziv77, to confront this attack. Our three models change the deterministic characteristic of the compression algorithm: each compression with the same input gives output of different lengths. We implemented SSL/TLS protocol and the Lempel-Ziv77 compression algorithm, and used them as a base for our simulations of compression side-channel attack. After performing the simulations, all three models successfully prevented the attack. However, we demonstrate that our randomized models can still be broken by a stronger version of compression side-channel attack that we created. But this latter attack has a greater time complexity and is easily detectable. Finally, from the results, we conclude that our models couldn't compress as well as Lempel-Ziv77, but they can be used against compression side-channel attacks.

【 预 览 】
附件列表
Files Size Format View
Randomized Lempel-Ziv Compression for Anti-Compression Side-Channel Attacks 2317KB PDF download
  文献评价指标  
  下载次数:25次 浏览次数:31次