What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS

A number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular session. Furthermore, some insecure application-lay...

Full description

Bibliographic Details
Main Authors: Alashwali, ES, Rasmussen, K
Format: Conference item
Published: Springer International Publishing 2018
_version_ 1826280881389568000
author Alashwali, ES
Rasmussen, K
author_facet Alashwali, ES
Rasmussen, K
author_sort Alashwali, ES
collection OXFORD
description A number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular session. Furthermore, some insecure application-layer protocols such as the Simple Mail Transfer Protocol (SMTP) negotiate the use of TLS itself on top of the application protocol to secure the communication channel. These protocols are often vulnerable to a class of attacks known as downgrade attacks which targets this negotiation mechanism. In this paper we create the first taxonomy of TLS downgrade attacks. Our taxonomy classifies possible attacks with respect to four different vectors: the protocol element that is targeted, the type of vulnerability that enables the attack, the attack method, and the level of damage that the attack causes. We base our taxonomy on a thorough analysis of fifteen notable published attacks. Our taxonomy highlights clear and concrete aspects that many downgrade attacks have in common, and allows for a common language, classification, and comparison of adowngrade attacks. We demonstrate the application of our taxonomy by classifying the surveyed attacks.
first_indexed 2024-03-07T00:20:23Z
format Conference item
id oxford-uuid:7c572a23-ffe4-4003-9787-897701f8e120
institution University of Oxford
last_indexed 2024-03-07T00:20:23Z
publishDate 2018
publisher Springer International Publishing
record_format dspace
spelling oxford-uuid:7c572a23-ffe4-4003-9787-897701f8e1202022-03-26T20:56:27ZWhat's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLSConference itemhttp://purl.org/coar/resource_type/c_5794uuid:7c572a23-ffe4-4003-9787-897701f8e120Symplectic Elements at OxfordSpringer International Publishing2018Alashwali, ESRasmussen, KA number of important real-world protocols including the Transport Layer Security (TLS) protocol have the ability to negotiate various security-related choices such as the protocol version and the cryptographic algorithms to be used in a particular session. Furthermore, some insecure application-layer protocols such as the Simple Mail Transfer Protocol (SMTP) negotiate the use of TLS itself on top of the application protocol to secure the communication channel. These protocols are often vulnerable to a class of attacks known as downgrade attacks which targets this negotiation mechanism. In this paper we create the first taxonomy of TLS downgrade attacks. Our taxonomy classifies possible attacks with respect to four different vectors: the protocol element that is targeted, the type of vulnerability that enables the attack, the attack method, and the level of damage that the attack causes. We base our taxonomy on a thorough analysis of fifteen notable published attacks. Our taxonomy highlights clear and concrete aspects that many downgrade attacks have in common, and allows for a common language, classification, and comparison of adowngrade attacks. We demonstrate the application of our taxonomy by classifying the surveyed attacks.
spellingShingle Alashwali, ES
Rasmussen, K
What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title_full What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title_fullStr What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title_full_unstemmed What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title_short What's in a downgrade? A taxonomy of downgrade attacks in the TLS protocol and application protocols using TLS
title_sort what s in a downgrade a taxonomy of downgrade attacks in the tls protocol and application protocols using tls
work_keys_str_mv AT alashwalies whatsinadowngradeataxonomyofdowngradeattacksinthetlsprotocolandapplicationprotocolsusingtls
AT rasmussenk whatsinadowngradeataxonomyofdowngradeattacksinthetlsprotocolandapplicationprotocolsusingtls