Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Post on 23-Feb-2016

57 views 0 download

Tags:

description

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi. Outline. Problem: Bad Keys Why Should You Care? Defenses Questions. Outline. Problem: Bad Keys Why Should You Care? - PowerPoint PPT Presentation

Transcript of Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Problem

Problem

ProblemRandom number generator (hard problem)Keys generated by openssl Linux

dev/urandom uses time of use keyboard disk access timing

Problem

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Why Should You Care

Why Should You Care

Why Should You Care

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Defense

Outline1.Problem: Bad Keys2.Why Should You Care?3.Defenses4.Questions

Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.http://www.youtube.com/watch?v=kuaAdXVMm40