21
Attacks on the TLS Record Protocol
In the previous chapter, we learned about attacks on the TLS Handshake protocol. Those attacks exploit either protocol-level weaknesses – as in the case of the triple handshake or TLS downgrade attacks – or the existence of padding oracles that allow Mallory to extract the TLS pre-shared key.
In this chapter, we study attacks on the TLS Record protocol. Among other things, you will learn the following:
How the timing of the messages coming from Alice, the TLS server, can be used to create a padding oracle similar to the one we discussed in the previous chapter (albeit targeting the TLS Record protocol)
How predictable initialization vectors can be used to attack the CBC mode of operation
How lossless data compression can undermine the security of an encryption scheme even if the scheme itself is cryptographically secure
Upon completing this chapter, you will have a good overview and good understanding of the attacks targeting the TLS...