1 / 15

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi. Outline. Problem: Bad Keys Why Should You Care? Defenses Questions. Outline. Problem: Bad Keys Why Should You Care?

lauren
Download Presentation

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia HeningerZakirDurumericEric WustrowJ.AlexHalderman Presented by Ganbi

  2. Outline • Problem: Bad Keys • Why Should You Care? • Defenses • Questions

  3. Outline • Problem: Bad Keys • Why Should You Care? • Defenses • Questions

  4. Problem

  5. Problem

  6. Problem • Random number generator (hard problem) • Keys generated by openssl Linux • dev/urandom uses • time of use • keyboard • disk access timing

  7. Problem

  8. Outline • Problem: Bad Keys • Why Should You Care? • Defenses • Questions

  9. Why Should You Care

  10. Why Should You Care

  11. Why Should You Care

  12. Outline • Problem: Bad Keys • Why Should You Care? • Defenses • Questions

  13. Defense

  14. Outline • Problem: Bad Keys • Why Should You Care? • Defenses • Questions

  15. Works Cited • Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print. • http://www.youtube.com/watch?v=kuaAdXVMm40

More Related