Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...

15
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi

Transcript of Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir...

Page 1: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Page 2: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 3: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 4: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Problem

Page 5: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Problem

Page 6: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Problem

Random number generator (hard problem)

Keys generated by openssl Linux dev/urandom uses

time of use

keyboard

disk access timing

Page 7: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Problem

Page 8: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 9: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Why Should You Care

Page 10: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Why Should You Care

Page 11: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Why Should You Care

Page 12: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 13: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Defense

Page 14: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 15: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented.

Works Cited

Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.

http://www.youtube.com/watch?v=kuaAdXVMm40