mining your ps and qs: detection of widespread weak keys in network devices nadia heninger zakir...

15
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman Presented by Ganbi

Upload: sharyl-peters

Post on 04-Jan-2016

218 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network

Devices

Nadia Heninger Zakir Durumeric Eric Wustrow J. Alex Halderman

Presented by Ganbi

Page 2: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 3: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 4: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Problem

Page 5: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Problem

Page 6: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Problem

Random number generator (hard problem)

Keys generated by openssl Linux dev/urandom uses

time of use

keyboard

disk access timing

Page 7: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Problem

Page 8: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 9: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Why Should You Care

Page 10: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Why Should You Care

Page 11: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Why Should You Care

Page 12: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 13: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Defense

Page 14: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Outline

1.Problem: Bad Keys

2.Why Should You Care?

3.Defenses

4.Questions

Page 15: Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices Nadia Heninger  Zakir Durumeric  Eric Wustrow J.  Alex Halderman Presented

Works Cited

Heninger, Durumeric, Wustrow, and Halderman "Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices" (n.d.): n. pag. Print.

http://www.youtube.com/watch?v=kuaAdXVMm40