Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...
-
Upload
sharyl-peters -
Category
Documents
-
view
216 -
download
0
Transcript of Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network
Devices
Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman
Presented by Ganbi
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
Problem
Problem
Problem
Random number generator (hard problem)
Keys generated by openssl Linux dev/urandom uses
time of use
keyboard
disk access timing
Problem
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
Why Should You Care
Why Should You Care
Why Should You Care
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
Defense
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
Works Cited
Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.
http://www.youtube.com/watch?v=kuaAdXVMm40