+ All Categories
Home > Documents > Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Date post: 23-Feb-2016
Category:
Upload: lauren
View: 58 times
Download: 0 times
Share this document with a friend
Description:
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi. Outline. Problem: Bad Keys Why Should You Care? Defenses Questions. Outline. Problem: Bad Keys Why Should You Care? - PowerPoint PPT Presentation
Popular Tags:
15
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi
Transcript
Page 1: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Page 2: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 3: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 4: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 5: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 6: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

ProblemRandom number generator (hard problem)Keys generated by openssl Linux

dev/urandom uses time of use keyboard disk access timing

Page 7: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 8: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 9: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 10: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 11: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 12: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 13: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Defense

Page 14: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 15: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.http://www.youtube.com/watch?v=kuaAdXVMm40


Recommended