Download presentation
Presentation is loading. Please wait.
Published bySharyl Peters Modified over 8 years ago
1
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi
2
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
3
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
4
Problem
6
Random number generator (hard problem) Keys generated by openssl Linux dev/urandom uses time of use keyboard disk access timing
7
Problem
8
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
9
Why Should You Care
12
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
13
Defense
14
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
15
Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print. http://www.youtube.com/watch?v=kuaAdXVMm40
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.