Understanding and Managing Entropy Usage

Presented at Black Hat USA 2015, Aug. 5, 2015, 11:30 a.m. (50 minutes)

As security and privacy concerns become an above the fold concern for the public at large and enterprises continue to grapple with targeted intrusions, cryptography is becoming a ubiquitous and necessary characteristic of modern IT systems. While the primitives and core algorithms are well understood, there are still numerous concerns regarding properly encrypting data that transcend decisions such as public vs. private key or key length. Underlying nearly every modern cryptosystem is the need to have cryptographically strong random numbers. Key generation and inclusion of nonces to prevent replay are two areas where lack of quality random numbers can completely destroy the security provided by the underlying cryptosystem.

For decades, we have used Pseudo Random Number Generators (PRNGs) as a surrogate for truly random numbers. While these PRNGs have been generally sufficient for historic cryptographic usage, they are only as good as their underlying entropy source. With advances, such as Perfect Forward Secrecy in TLS (and its wide scale deployment), entropy usage has skyrocketed. Unfortunately, enterprises dont have any understanding of their entropy requirements and entropy usage in the systems we use every day. How much entropy does an OpenSSL PFS transaction actually use? What are the sources of entropy used in your front line webservers? How does entropy creation vary in different versions of Linux? These are all important questions with no clear answer.

This talk aims to shine light on the core concerns of entropy creation and entropy utilization. We have analyzed a wide variety of systems, including different versions of the Linux and FreeBSD kernel, OpenSSL, OpenSSH, OpenVPN, and other crypto systems and documented their requirements for random numbers and required amount of entropy to function correctly. The team will also present findings entropy consumption for a variety of TLS modes including the impact of PFS. We will also present analysis of the quality and quantity of entropy sources available on common desktop, laptop, server, and mobile hardware. Finally, the team will also release the first version of our open source software, libentropy, that provides a unified interface for OpenSSL to manage sources of entropy and report status of entropy creation and utilization.


Presenters:

  • Bruce Potter / @gdead - KEYW Corporation   as Bruce Potter
    Mr. Potter is a director at KEYW Corporation and was previously the Chief Technologist and cofounder of Ponte Technologies. Mr. Potter has over a decade of system and software attack experience. He has lead teams performing advanced penetration testing and successful exploitation of devices such as JavaCard-based smart cards, cellular and smartphones, embedded networking devices, and Point of Sale terminals. The systems Mr. Potter has assessed have used a variety of protection mechanisms including virtual machines, code obfuscation, proprietary operating systems, and hardware anti-tamper capabilities. Mr. Potter has a broad information security background including network security, software assurance, software exploitation, security operations, and advanced attack detection. M r. Potter has published several books written numerous articles on a variety of information security topics. Mr. Potter is a frequent speaker at security conferences including Black Hat, DefCon, DerbyCon, and several BSides. Mr. Potter is the founder of The Shmoo Group of security, crypto, and privacy professionals. Through The Shmoo Group, Mr. Potter assists with a number of open source projects and the yearly ShmooCon security conference held in Washington, DC.
  • Sasha Wood - KEYW Coproration
    Ms. Wood is a Senior Software Engineer at KEYW Coproration, with ten years' experience in developing and assessing software systems, and researching classical and quantum computational complexity. Ms. Wood has designed, implemented and shipped large software products for both government agencies and Fortune 500 companies. Ms. Wood has developed software to detect insider threats, has analyzed large software corpuses (100,000+ projects) to determine useful characteristics for source analysis, and has tested and evaluated state of the art quantum computing tools and programming languages. Ms. Wood holds a Masters in Computer Science from Carnegie Mellon, and Bachelors in both Computer Science and Physics from MIT.

Links:

Similar Presentations: