Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Slides:



Advertisements
Similar presentations
Computer Basics. PCP C A PC is a Personal Computer. PCs are portable and used by you. There are four basics parts or components usually called Hardware:
Advertisements

PARTS OF A COMPUTER Monitor Monitor Central Processing Unit Central Processing UnitKeyboardMouseprinter.
RIPE 68 - Measurement, Analysis and Tools Working Group15 May 2014 Internet-Wide Scanning and its Measurement Applications Zakir Durumeric University of.
Test on Input, Output, Processing, & Storage Devices
Computer Hardware 4 Main Types.
2. branch bonus = 1,000x20%x.03 x6= $ personal bonus = 5,000-1,000x20%x.03 = $24 4. weak team bonus = 15,000x20%x.03= $90 5. strong team bonus =
Unit 4 Business Communication
Data Integrity Proofs in Cloud Storage Sravan Kumar R, Ashutosh Saxena Communication Systems and Networks (COMSNETS), 2011 Third International Conference.
SkypeMorph: Protocol Obfuscation for Tor Bridges
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
Michael Henderson. Objectives for chapter  To show the importance of computer maintenance computing.  Identify problems that can occur if harware is.
S EMINAR A SELF DESTRUCTING DATA SYSTEM BASED ON ACTIVE STORAGE FRAMEWORK ONON P RESENTED BY S HANKAR G ADHVE G UIDED BY P ROF.P RAFUL P ARDHI.
© 2003 School of Computing, University of Leeds SY32 Secure Computing, Lecture 15 Implementation Flaws Part 3: Randomness and Timing Issues.
Unsupervised Learning: Clustering Rong Jin Outline  Unsupervised learning  K means for clustering  Expectation Maximization algorithm for clustering.
Introduction to Computer Essentials. Information Systems 1. People 2. Procedures 3. Software 4. Hardware 5. Data.
McGraw-Hill Technology Education © 2004 by the McGraw-Hill Companies, Inc. All Rights Reserved. Introduction to Computer Essentials.
1 Analysis of the Linux Random Number Generator Zvi Gutterman, Benny Pinkas, and Tzachy Reinman.
Input Devices or Ways to create the stuff you want.
N° 23 page 70page N° 24 page 70page N° 25 page 70page N° 26 page 70page N° 45 page 71page.
= Home Button. This is a portable memory device. It can hold from around 32Mb up to 256GB. These are sometimes called ‘Flash Drives’ and they are universal,
Dan Boneh Public Key Encryption from trapdoor permutations RSA in practice Online Cryptography Course Dan Boneh.
Computer… An electronic machine Monitor Mouse Printer (Inkjet) Key Board Cabinet UPS PPT
 Keyboards, LCDs most widely used input/output devices of the 8051  Contents to be covered:  keyboard fundamentals  key press and key detection mechanisms.
Anticensorship in the Network Infrastructure Eric Wustrow University of Michigan.
The Operating System. without an operating system: the screen would be blank there'd be no response when you tap the keys disk programmes wouldn't load.
Chapter 1 Engineering Problem Solving 1. Hardware and Software 2 A computer is a machine designed to perform operations specified with a set of instructions.
Configuration.
1 System Resources. 2 Interrupt Request (IRQ) Channels Interrupt Request (IRQ) Channels Direct Memory Access (DMA) Channels Direct Memory Access (DMA)
Brief overview Basic Concepts of Computer. What is a computer? A computer is a tool to process data Data Alphabet/Numeric Graphic Sound.
A PS/2 mouse is shown above with the cover removed. The ball (upper right) rolls two plastic X and Y axles with a slotted wheel at one end. The slotted.
Computer and its components Computer Skills university of Palestine.
Lecture 2 “Structure of computer” Informatics. Computer is  general purpose device that can be programmed to carry out a set of arithmetic or logical.
Www. engineersportal.in. OUTLINES Network & Network Security Need of Network Security Methods of Network Security Firewall Firewall’s Works Firewall’s.
1 nd Semester Module1 Introduction to Computer and Programming Thanawin Rakthanmanon Create by: Aphirak Jansang Computer.
Major Computer Parts.
Chapter 8: Operating Systems and Utility Programs Catherine Gifford Dan Falgares.
(Tahlia and Mabel are SUPA!!!). CPU CPU mean central process unit A central process is the carries out the instructions to computer programming.
Introduction to Computer Administration Course Supervisor: Muhammad Saeed.
Computer A computer is an electronic machine that takes information, processes it,and stores it. Computers are made up of hardware ( monitor, tower, keyboard,
1 Chapter 7 Operating System & Utility Programs.  consists of the programs that control or maintain the operations of the computer and its devices. It.
Zakir Durumeric, James Kasten,David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer,
Deepnet Unified Authentication for Outlook Anywhere.
Introduction to Computers There are 2 types of personal computers (PC). They are called Laptop and Desktop. This is a Desktop Computer This is a Laptop.
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices N. Heninger, Z. Durumeric, E. Wustrow, and J. Halderman USENIX Sec’
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
HARDWARE Input and Output. Hardware Input Devices Output Devices Multifunctional Devices Storage Processing Devices.
Baris, Kenny Jean L. Galliguez, Saldy Malapit, Ma.Cristina A Mira, Vannessa Ramos, Joy HOTEL MATERIALS INVENTORY SYSTEM.
Ensuring Sufficient Entropy in RSA Modulus Generation Wendy Mu Henry Corrigan-Gibbs Dan Boneh.
The Computer System CS 103: Computers and Application Software.
Parts and Operation of a Computer
Computer Parts and Components Overview of the System.
ESSENTIAL QUESTION  How can the computer be used as a tool in the classroom?
INPUT, Output & storage devices
By Paul John PARTS OF A COMPUTER. Modem  device connecting computers via phone line, allowing the exchange of information.
ONLINE INTRUSION ALERT AGGREGATION WITH GENERATIVE DATA STREAM MODELING.
Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point Erich Dondyk, Cliff C. Zou University of Central Florida.
 Kim  Allen  Kenneth. Chapter 1 Computer Fundamentals.
Zippier ZMap Internet-Wide Scanning at 10Gbps David Adrian, Zakir Durumeric, Gulshan Singh, J. Alex Halderman University of Michigan WOOT ’14 San Diego,
親愛的吉姆舅舅: 今天吃完晚餐後,奶奶說,在家 裡情況變好以前,您要我搬到城裡跟 您住。奶奶有沒有跟您說,爸爸已經 好久沒有工作,也好久沒有人請媽媽 做衣服了? 我們聽完都哭了,連爸爸也哭了, 但是媽媽說了一個故事讓我們又笑了。 她說:您們小的時候,她曾經被您追 得爬到樹上去,真的嗎? 雖然我個子小,但是我很強壯,
Failure to protect stored data
Basic Computer Components
08/28/06 parts of the computer.
 Printer not found  Unable to find the printer  No devices found  Your printer could not be found on your wireless network.
0. What is a Computer?.
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Originally from: N. Heninger, Z. Durumeric, E. Wustrow, J. A. Halderman USENIX.
ITEC 1011 Introduction to Information Technologies 0. What is a Computer?
Understanding input, output and storage devices
Put the on A on the keyboard.

08/28/06 parts of the computer.
Presentation transcript:

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented by Ganbi

Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions

Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions

Problem

Random number generator (hard problem) Keys generated by openssl Linux dev/urandom uses time of use keyboard disk access timing

Problem

Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions

Why Should You Care

Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions

Defense

Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions

Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.