Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...

Post on 04-Jan-2016

216 views 0 download

Tags:

Transcript of Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Problem

Problem

Problem

Random number generator (hard problem)

Keys generated by openssl Linux dev/urandom uses

time of use

keyboard

disk access timing

Problem

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Why Should You Care

Why Should You Care

Why Should You Care

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Defense

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Works Cited

Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.

http://www.youtube.com/watch?v=kuaAdXVMm40