mining your ps and qs: detection of widespread weak keys in network devices nadia heninger zakir...
TRANSCRIPT
![Page 1: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/1.jpg)
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network
Devices
Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman
Presented by Ganbi
![Page 2: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/2.jpg)
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
![Page 3: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/3.jpg)
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
![Page 4: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/4.jpg)
Problem
![Page 5: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/5.jpg)
Problem
![Page 6: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/6.jpg)
Problem
Random number generator (hard problem)
Keys generated by openssl Linux dev/urandom uses
time of use
keyboard
disk access timing
![Page 7: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/7.jpg)
Problem
![Page 8: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/8.jpg)
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
![Page 9: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/9.jpg)
Why Should You Care
![Page 10: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/10.jpg)
Why Should You Care
![Page 11: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/11.jpg)
Why Should You Care
![Page 12: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/12.jpg)
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
![Page 13: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/13.jpg)
Defense
![Page 14: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/14.jpg)
Outline
1.Problem: Bad Keys
2.Why Should You Care?
3.Defenses
4.Questions
![Page 15: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented](https://reader035.vdocuments.mx/reader035/viewer/2022062422/56649f1c5503460f94c334ea/html5/thumbnails/15.jpg)
Works Cited
Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.
http://www.youtube.com/watch?v=kuaAdXVMm40