[Sls-sea-dls] Blogpost on vulnerabilities found in NASA cryprolib SDLS implementation
Antonios Atlasis
Antonios.Atlasis at esa.int
Wed Dec 18 19:25:50 UTC 2024
Dear all,
After disclosing responsibly the findings on SDLS NASA crypto lib implementation, our YGT , Antonin Boulnois, published them in the following blogpost:
https://securitybynature.fr/post/hacking-cryptolib/
Hint: you will find more vulnerabilities than the ones presented at the last CCSDS meeting ;-)
Regards,
Antonis
__________________________________________
Dr Antonios Atlasis
Hd. System Security Section (TEC-SES)
End-to-End Systems Division
Directorate of Technology, Engineering and Quality
European Space Research and Technology Centre (ESTEC)
Keplerlaan 1, PO Box 299
NL-2201 AZ Noordwijk, The Netherlands
T +31 71 565 6095
M +31 61 873 5554
This message is intended only for the recipient(s) named above. It may contain proprietary information and/or protected content. Any unauthorised disclosure, use, retention or dissemination is prohibited. If you have received this e-mail in error, please notify the sender immediately. ESA applies appropriate organisational measures to protect personal data, in case of data privacy queries, please contact the ESA Data Protection Officer (dpo at esa.int).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mailman.ccsds.org/pipermail/sls-sea-dls/attachments/20241218/0565afd3/attachment.htm>
More information about the SLS-SEA-DLS
mailing list