A team of academics unveiled a new cryptographic attack this week that could break the encrypted TLS drive, allowing attackers to monitor and steal data that was hitherto considered secure.
This new attack does not have a fancy name as most cryptographic attacks tend to have, but it still seems to work in the latest version of the TLS protocol, TLS 1.3, which was released on last spring and is considered the safest.
The new cryptographic attack on TLS is not new, but another variant of the original Bleichenbacher attack.
The original attack was named after the Swiss cryptographer Daniel Bleichenbacher, who in 1998 introduced a first attack against systems that used RSA encryption in conjunction with the PKCS # 1 v1 encoding function.
The reason for all these variations of the attack is because the authors of the TLS encryption protocol decided to add countermeasures to make it more difficult to guess the RSA decryption key, instead of completely replacing the insecure RSA algorithm.
These countermeasures are described in section 22.214.171.124 of the TLS standard (RFC 5246), which many hardware manufacturers and software developers have misinterpreted or not followed exactly the steps it sets out.
The latest variations of the Bleichenbacher attack were described in a technical publication published last Wednesday: "The 9 lives of CAT Bleichenbacher: New cache attacks in the TLS application" in Greek and "The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations”The original title of the PDF.
Seven researchers from around the world have discovered (again) another way to break RSA PKCS # 1 v1.5, the most common RSA configuration used to encrypt TLS connections today.
In addition to breaking the TLS, the new Bleichenbacher attack works perfectly for Google's new QUIC encryption protocol.
"The attack exploits a leak of lateral channels through cache access timers to break the RSA key exchanges of TLS applications," the researchers said.
Even the latest version of the TLS 1.3 protocol, where the use of RSA has been kept to a minimum, can be downgraded to TLS 1.2, where the new variant of the Bleichenbacher attack operates.
Updates of all libraries affected by the attack were published simultaneously in November 2018, when the researchers published an initial draft of their research.