{"guid":"ea27b2dc-d558-4fab-8406-a9db30930f8f","title":"Resilienced Kryptographie","subtitle":null,"slug":"34c3-9142-resilienced_kryptographie","link":"https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9142.html","description":"Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der Minix 3 basierten Intel ME Implementierung zeigen, dass das Vertrauen in hardwaregestützte Coputersicherheit grundlegend hinterfragt werden muss. Die Robustness in feindlicher Umgebung kann mit anspruchsvolleren kryptographische Verfahren mathematisch abgesichert erhöht werden.\n\n\nKryptographie hilft gegen sehr mächtige Angreifer.  Wenn jedoch Fehler bei der Schlüsselgenerierung gemacht werden oder Hardwarebackdoors schwer aufdeckbaren Angriffe ermöglichen, bricht das gesamte Sicherheitsfundament. Die Sicherheitsdesaster bei der Schlüsselgenerierung in TPM Chips und bei der Minix 3 basierten Intel ME Implementierung zeigen, dass das Vertrauen in hardwaregestützte Coputersicherheit grundlegend hinterfragt werden muss. \n\nEs gibt eine Reihe von einfachen mathematischen Hacks, um auch zukünftige Angriffsmethoden nachhaltig zu erschweren. Auch die Robustness in feindlicher Umgebung kann mit anspruchsvolleren kryptographische Verfahren mathematisch abgesichert erhöht werden. ","original_language":"deu","persons":["ruedi","cforler"],"view_count":2749,"promoted":false,"date":"2017-12-29T00:00:00.000+01:00","release_date":"2017-12-29T01:00:00.000+01:00","updated_at":"2026-02-03T23:30:10.102+01:00","tags":["34c3","9142","Security"],"length":3567,"duration":3567,"thumb_url":"https://static.media.ccc.de/media/congress/2017/9142-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2017/9142-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2017/ea27b2dc-d558-4fab-8406-a9db30930f8f-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2017/ea27b2dc-d558-4fab-8406-a9db30930f8f-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/34c3-9142-resilienced_kryptographie","url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_title":"34C3: TUWAT","conference_url":"https://api.media.ccc.de/public/conferences/34c3","related":[{"event_id":4762,"event_guid":"b036385c-ec1a-44e5-ae48-af703ce9b5d3","weight":51},{"event_id":4763,"event_guid":"2ef3b60f-6e5c-4c23-a145-d263685ec13e","weight":47},{"event_id":4764,"event_guid":"da934433-0092-4749-b606-56b65e84214f","weight":48},{"event_id":4767,"event_guid":"f2ca3661-30c8-476e-9d6b-920bb20b21eb","weight":44},{"event_id":4784,"event_guid":"65a25dfd-56dd-4e87-a910-334e2dc25a9c","weight":49},{"event_id":4791,"event_guid":"8d29d28d-a222-4731-bdfc-fde590385cae","weight":93},{"event_id":4794,"event_guid":"a2887b4a-0c9d-4220-a52f-c65c20ae25d7","weight":67},{"event_id":4800,"event_guid":"a9ebf7e3-abc5-49d9-8efe-316b3bc52902","weight":68},{"event_id":4814,"event_guid":"991aceeb-d25f-4f59-9317-bf438775a215","weight":49},{"event_id":4826,"event_guid":"16645200-2036-4a3c-a44d-a5ff44ac2991","weight":101},{"event_id":4828,"event_guid":"4cb7be14-bfbd-42a2-a556-9ef8e8bd6ba7","weight":56},{"event_id":4837,"event_guid":"664f6c37-2fab-4191-a5d6-042aba7518c3","weight":45},{"event_id":4840,"event_guid":"21127aeb-fe1f-4506-a3f0-d747e20419a5","weight":55},{"event_id":4842,"event_guid":"581ccbad-4bbf-47a2-8845-f52278d61061","weight":53},{"event_id":4844,"event_guid":"5c5e888e-4556-405b-a205-e59b97db99e1","weight":53},{"event_id":4859,"event_guid":"95f6e79b-e6a5-4d93-b4ba-cb70470ed819","weight":46},{"event_id":4866,"event_guid":"117a52b4-f675-49dd-aafe-659c07b6bc9c","weight":322},{"event_id":4870,"event_guid":"2cb8f405-10be-40f5-ae95-579f024a0c84","weight":62},{"event_id":4875,"event_guid":"6be7c907-103c-4c96-969a-32890c98a8cd","weight":4},{"event_id":4876,"event_guid":"dec6a7e0-2651-4bb5-8300-977795e901ed","weight":103},{"event_id":4879,"event_guid":"73bcc647-faa3-4c6c-8a48-8d540de454ee","weight":63},{"event_id":4882,"event_guid":"00e9a3f8-16b5-45db-a4e3-312fda04c7df","weight":64},{"event_id":4885,"event_guid":"956cf3ed-c342-4c1d-b636-29ec3d4578d2","weight":98},{"event_id":4893,"event_guid":"6c4b2648-3840-476c-b966-c008010bca66","weight":51},{"event_id":4897,"event_guid":"ca89efbd-5061-436d-91e6-1e7e376ee77a","weight":70},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":44},{"event_id":4903,"event_guid":"f68f2747-1c57-4531-a574-3ebe77d80135","weight":54},{"event_id":4919,"event_guid":"bf23997f-20bb-40a5-96f9-5f43f453e9dd","weight":48},{"event_id":4929,"event_guid":"8e222759-cd6b-403b-8fe1-3517bf7d2802","weight":105}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"deu","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie.de.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T17:46:20.312+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/34c3-9142-deu-eng-Resilienced_Kryptographie.de.srt","url":"https://api.media.ccc.de/public/recordings/44491","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":453,"length":3567,"mime_type":"video/mp4","language":"deu","filename":"34c3-9142-deu-Resilienced_Kryptographie.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T22:14:53.064+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-9142-deu-Resilienced_Kryptographie.mp4","url":"https://api.media.ccc.de/public/recordings/21755","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":454,"length":3567,"mime_type":"video/mp4","language":"eng","filename":"34c3-9142-eng-Resilienced_Kryptographie.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T22:15:10.727+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-9142-eng-Resilienced_Kryptographie.mp4","url":"https://api.media.ccc.de/public/recordings/21756","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":769,"length":3567,"mime_type":"video/mp4","language":"deu-eng","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T22:15:34.346+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-hd/34c3-9142-deu-eng-Resilienced_Kryptographie_hd.mp4","url":"https://api.media.ccc.de/public/recordings/21757","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":372,"length":3567,"mime_type":"video/mp4","language":"deu-eng","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-29T23:48:18.312+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-hd/34c3-9142-deu-eng-Resilienced_Kryptographie_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/21780","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":54,"length":3552,"mime_type":"audio/mpeg","language":"deu","filename":"34c3-9142-deu-Resilienced_Kryptographie.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-29T23:52:10.353+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/mp3/34c3-9142-deu-Resilienced_Kryptographie.mp3","url":"https://api.media.ccc.de/public/recordings/21787","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":34,"length":3552,"mime_type":"audio/opus","language":"deu","filename":"34c3-9142-deu-Resilienced_Kryptographie.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2017-12-29T23:53:13.580+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/opus/34c3-9142-deu-Resilienced_Kryptographie.opus","url":"https://api.media.ccc.de/public/recordings/21789","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":209,"length":3567,"mime_type":"video/mp4","language":"deu-eng","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-30T00:09:34.096+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/h264-sd/34c3-9142-deu-eng-Resilienced_Kryptographie_sd.mp4","url":"https://api.media.ccc.de/public/recordings/21801","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":803,"length":3567,"mime_type":"video/webm","language":"deu-eng","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2017-12-30T02:09:15.153+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-sd/34c3-9142-deu-eng-Resilienced_Kryptographie_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/21878","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":788,"length":3567,"mime_type":"video/webm","language":"deu-eng","filename":"34c3-9142-deu-eng-Resilienced_Kryptographie_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2017-12-30T02:14:34.971+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/webm-hd/34c3-9142-deu-eng-Resilienced_Kryptographie_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/21886","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"},{"size":70,"length":3567,"mime_type":"video/mp4","language":"deu","filename":"34c3-9142-deu-Resilienced_Kryptographie_sd-slides.mp4","state":"new","folder":"slides-h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2018-01-02T16:10:36.497+01:00","recording_url":"https://cdn.media.ccc.de/congress/2017/slides-h264-sd/34c3-9142-deu-Resilienced_Kryptographie_sd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/22357","event_url":"https://api.media.ccc.de/public/events/ea27b2dc-d558-4fab-8406-a9db30930f8f","conference_url":"https://api.media.ccc.de/public/conferences/34c3"}]}