Please use this identifier to cite or link to this item:
https://hdl.handle.net/10356/184052
Title: | Topics in cryptography: analysis of TLS man-in-the-middle attacks | Authors: | Lim, Dong Wan | Keywords: | Computer and Information Science | Issue Date: | 2025 | Publisher: | Nanyang Technological University | Source: | Lim, D. W. (2025). Topics in cryptography: analysis of TLS man-in-the-middle attacks. Final Year Project (FYP), Nanyang Technological University, Singapore. https://hdl.handle.net/10356/184052 | Project: | CCDS24-0421 | Abstract: | Transport Layer Security (TLS) is an essential cryptographic protocol for web security in today’s digitally connected world, given the porous nature of the Internet and the evolving cybersecurity threat landscape. However, older protocol versions of TLS, particularly TLS 1.0, are found to be vulnerable to several attacks, including those involving attackers employing Man-in-the-Middle (MITM) techniques. In this report, we will analyze 2 well-known TLS attacks that involve MTIM and target similar vulnerabilities in TLS 1.0, namely: Padding Oracle On Downgraded Legacy Encryption (POODLE) and Browser Exploit Against SSL/TLS (BEAST). Through a detailed analysis of the attack mechanisms employed in each attack, this study will examine how both attacks exploit weaknesses in the Cipher Block Chaining (CBC) mode of operation for encryption and decryption adopted in TLS 1.0, as well as Padding Oracle vulnerabilities found in TLS 1.0 to compromise TLS connections between client web browsers and web servers. Proof-of-Concept (PoC) simulations of both attacks are also implemented using Python to demonstrate the inner workings and mechanisms of the attacks in a computationally feasible manner. Moreover, given the similarity in the nature of the attacks and the vulnerabilities exploited by the attacks, we will evaluate and compare the complexity of the attacks based on execution time, brute-force attempts needed and overall impact in the real world. Finally, the report shall discuss various specific strategies to safeguard TLS connections, not only against POODLE and BEAST attacks but also potentially other TLS attacks. | URI: | https://hdl.handle.net/10356/184052 | Schools: | College of Computing and Data Science | Fulltext Permission: | restricted | Fulltext Availability: | With Fulltext |
Appears in Collections: | CCDS Student Reports (FYP/IA/PA/PI) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Lim Dong Wan_CCDS24-0421_FYP Amended Final Report.pdf Restricted Access | 5.5 MB | Adobe PDF | View/Open |
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.