21
Attacks on the TLS Record Protocol
In the previous chapter, we learned about attacks on the TLS Handshake protocol. Those attacks exploit either protocol-level weaknesses – as in the case of the triple handshake or TLS downgrade attacks – or the existence of padding oracles that allow Mallory to extract the TLS pre-shared key.
In this chapter, we study attacks on the TLS Record protocol. Among other things, you will learn the following:
How the timing of the messages coming from Alice, the TLS server, can be used to create a padding oracle similar to the one we discussed in the previous chapter (albeit targeting the TLS Record protocol)
How predictable initialization vectors can be used to attack the CBC mode of operation
How lossless data ...
Get TLS Cryptography In-Depth now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.