TLS MITM attack on the Ripple XRP Ledger

Bachelor Thesis (2020)
Author(s)

W.L. Bubberman (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

Stefanie Roos – Mentor (TU Delft - Data-Intensive Systems)

Satwik Prabhu Kumble – Graduation committee member (TU Delft - Data-Intensive Systems)

RangaRao Venkatesha Prasad – Graduation committee member (TU Delft - Embedded Systems)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2020 Wolf Bubberman
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 Wolf Bubberman
Graduation Date
22-06-2020
Awarding Institution
Delft University of Technology
Project
['CSE3000 Research Project']
Programme
['Computer Science and Engineering']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The Ripple XRP Ledger network hosts a cryptocurrency called XRP which uses the TLS protocol to send messages between nodes. It is crucial that the network is tested against attacks to ensure its security. The Ripple XRP Ledger could be vulnerable to a Man-in-the-Middle (MITM) attack. This MITM attack is an attack which can intercept and modify data by posing as intended receiver of the message. Potentially, this could have major implications as message content could be intercepted and used maliciously. Therefore this paper aims to answer the question: ``Is it possible to conduct a TLS MITM attack on the XRP ledger to gain access to message content and how does such an attack affect the performance of the system?". The research done in this paper concluded that it is possible to conduct a TLS MITM attack on the XRP Ledger. The impact on performance is a delay in the travel time of a message. However, how big this delay is, is dependent on the network the attack is executed on. In the tested environment it was roughly adding a 69.2\% delay to a message. Future research is necessary to be able to modify the message content and to confirm if the larger the delay added by the MITM, the higher the probability that the MITM is detected.

Files

License info not available