21

Attacks on the TLS Record Protocol

In the previous chapter, we learned about attacks on the TLS Handshake protocol. Those attacks exploit either protocol-level weaknesses – as in the case of the triple handshake or TLS downgrade attacks – or the existence of padding oracles that allow Mallory to extract the TLS pre-shared key.

In this chapter, we study attacks on the TLS Record protocol. Among other things, you will learn the following:

  • How the timing of the messages coming from Alice, the TLS server, can be used to create a padding oracle similar to the one we discussed in the previous chapter (albeit targeting the TLS Record protocol)

  • How predictable initialization vectors can be used to attack the CBC mode of operation

  • How lossless data ...

Get TLS Cryptography In-Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.