Back to Results
First PageMeta Content
Secure Shell / Key generation / RSA / X.509 / Key size / Certificate authority / Digital signature / Public key fingerprint / Ssh-keygen / Cryptography / Public-key cryptography / Key management


Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
Add to Reading List

Document Date: 2012-07-11 15:38:00


Open Document

File Size: 488,83 KB

Share Result on Facebook

City

San Diego / /

Company

Hewlett-Packard / Diffie-Hellman Group / Bernstein / Citrix / Dell / IBM / Amazon / Cisco / ADTran / Intel / /

Country

Japan / Singapore / Ireland / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Java SSH Maverick library / OpenSSL library / TCP port / SSL Observatory / University of Michigan / GMP library / J. Alex Halderman‡ University of Michigan / University Zakir Durumeric‡∗ / EFF SSL Observatory / /

IndustryTerm

Internet scale / open-source software components / headless and embedded devices / server software / model device / server management devices / quasilinear-time algorithm / enterprise products / software implementations / technology industry / vulnerable devices / open-source cryptographic software components / network attached storage devices / security systems / particular device / insurance providers / important cryptographic transport protocols / Internet-wide / remarkable devices / software behaviors / plausible software configurations / cryptographic algorithms / embedded network devices / multiyear distributed-computing effort / enterprise-grade routers / computing / law firms / businessgrade phone/network routers / network exploration tool / consumer router / important cryptographic protocols / vulnerable device / online key-check service / similar devices / integer arithmetic algorithms / flawed software implementations / software components / remote management / network security devices / network storage devices / presented certificate chain / Internet-wide scanning We / Online resources For / web servers / i5 processor / snake-oil certificates / certificate processing / naïve quadratic algorithm / user authentication protocol / headless devices / remote access device / network devices / remote access devices / 2wire devices / consumer routers / /

OperatingSystem

FreeBSD / BSD / Microsoft Windows / MacOS / Linux / /

Organization

University of Michigan / UCSD / United States Navy / IBM Remote Server Administration / /

Person

Eric Wustrow / /

Position

detective / representative / /

Product

Twisted / Nmap 5 network exploration tool / II remote administration cards / Debian / II / implementations / designs / Nmap 5 / /

ProgrammingLanguage

Java / Python / /

ProvinceOrState

Virginia / Michigan / California / /

Technology

naïve quadratic algorithm / RAM / important cryptographic protocols / key exchange protocol / Linux / i5 processor / one router / operating system / specific cryptographic algorithms / Access businessgrade phone/network routers / GCD algorithm / cryptography / important cryptographic transport protocols / Java / consumer router / integer arithmetic algorithms / Gigaset DSL routers / enterprise-grade routers / relational database / VPN / private key / SSL / operating systems / TCP/IP / consumer-grade DSL routers / public key / thin client / SSH user authentication protocol / HTTP / consumer routers / IPv4 / VOIP / quasilinear-time algorithm / /

URL

www.snakeoil.dom / /

SocialTag