Sweet32 Attack
The SWEET32 attack is a cryptographic exploit that leverages a “birthday attack” against legacy 64-bit block ciphers (like Triple-DES and Blowfish) used in secure protocols such as TLS and OpenVPN. It allows an attacker to decrypt small portions of data, such as authentication cookies, by monitoring long-lived encrypted connections.
The security of a block cipher depends on the block size (n). The “birthday paradox” dictates that a collision (two different inputs producing the same ciphertext) becomes likely much earlier than exhausting the entire key space.
- A collision is expected after blocks of data are encrypted.
- To execute the attack, the adversary needs ~ encryptions of s and ~ encryptions known m needed (under the same key)
Q&A
- How much data is needed?
- To recover a two-block secret (such as a secure HTTP cookie), the attack requires capturing approximately 785 GB of traffic (about blocks).
- In their practical experiments, researchers were able to execute the attack with 610 GB for an HTTPS connection and 705 GB for an OpenVPN connection.
- How long does this take in practice?
- The attack generally takes less than two days (under 40 hours).
- In the researchers’ proof-of-concept demonstrations, it took roughly 19 hours to break an OpenVPN connection and 30.5 hours to break an HTTPS connection.
Relevant Note(s):