mining your ps and qs: detection of widespread weak keys in network devices

Post on 23-Feb-2016

57 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi. Outline. Problem: Bad Keys Why Should You Care? Defenses Questions. Outline. Problem: Bad Keys Why Should You Care? - PowerPoint PPT Presentation

TRANSCRIPT

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Problem

Problem

ProblemRandom number generator (hard problem)Keys generated by openssl Linux

dev/urandom uses time of use keyboard disk access timing

Problem

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Why Should You Care

Why Should You Care

Why Should You Care

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Defense

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.http://www.youtube.com/watch?v=kuaAdXVMm40

top related