Title
Measuring the Security Harm of TLS Crypto Shortcuts.
Abstract
TLS has the potential to provide strong protection against network-based attackers and mass surveillance, but many implementations take security shortcuts in order to reduce the costs of cryptographic computations and network round trips. We report the results of a nine-week study that measures the use and security impact of these shortcuts for HTTPS sites among Alexa Top Million domains. We find widespread deployment of DHE and ECDHE private value reuse, TLS session resumption, and TLS session tickets. These practices greatly reduce the protection afforded by forward secrecy: connections to 38% of Top Million HTTPS sites are vulnerable to decryption if the server is compromised up to 24 hours later, and 10% up to 30 days later, regardless of the selected cipher suite. We also investigate the practice of TLS secrets and session state being shared across domains, finding that in some cases, the theft of a single secret value can compromise connections to tens of thousands of sites. These results suggest that site operators need to better understand the tradeoffs between optimizing TLS performance and providing strong security, particularly when faced with nation-state attackers with a history of aggressive, large-scale surveillance.
Year
DOI
Venue
2016
10.1145/2987443.2987480
Internet Measurement Conference
Field
DocType
Citations 
Software deployment,Computer science,Computer security,Cryptography,Reuse,Computer network,Implementation,Forward secrecy,Cipher suite,TRIPS architecture,Transport Layer Security
Conference
6
PageRank 
References 
Authors
0.56
12
3
Name
Order
Citations
PageRank
Drew Springall11405.82
Zakir Durumeric293548.86
J. Alex Halderman32301149.67