mining your ps and qs: detection of widespread weak keys in network devices

15
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi

Upload: lauren

Post on 23-Feb-2016

57 views

Category:

Documents


0 download

DESCRIPTION

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi. Outline. Problem: Bad Keys Why Should You Care? Defenses Questions. Outline. Problem: Bad Keys Why Should You Care? - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Page 2: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 3: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 4: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 5: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 6: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

ProblemRandom number generator (hard problem)Keys generated by openssl Linux

dev/urandom uses time of use keyboard disk access timing

Page 7: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Problem

Page 8: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 9: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 10: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 11: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Why Should You Care

Page 12: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 13: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Defense

Page 14: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Page 15: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.http://www.youtube.com/watch?v=kuaAdXVMm40