Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
Problem
Random number generator (hard problem) Keys generated by openssl Linux dev/urandom uses time of use keyboard disk access timing
Problem
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
Why Should You Care
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
Defense
Outline 1. Problem: Bad Keys 2. Why Should You Care? 3. Defenses 4. Questions
Works Cited Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.