Back to Results
First PageMeta Content
Pseudorandom number generators / Cryptographic software / Cryptographic protocols / Secure Shell / Entropy / Key generation / OpenSSH / /dev/random / RSA / Cryptography / Public-key cryptography / Key management


Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
Add to Reading List

Document Date: 2012-07-02 15:01:16


Open Document

File Size: 377,74 KB

Share Result on Facebook

City

San Diego / /

Company

Dell / IBM / Hewlett-Packard / Amazon / Bernstein / Cisco / Red Hat / ADTran / Intel / /

Country

Japan / Singapore / Ireland / /

Currency

USD / /

/

Event

Product Issues / /

Facility

J. Alex Halderman‡ University of Michigan / OpenSSL library / TCP port / SSL Observatory / University of Michigan / University Zakir Durumeric‡∗ / EFF SSL Observatory / GMP library / /

IndustryTerm

Internet scale / open-source software components / headless and embedded devices / vulnerable device / online key-check service / server software / model device / server management devices / quasilinear-time algorithm / similar devices / enterprise products / software implementations / technology industry / vulnerable devices / human input devices / open-source cryptographic software components / software components / network attached storage devices / security systems / server systems / particular device / remote management / network security devices / important cryptographic transport protocols / network storage devices / presented certificate chain / headless and embedded systems / Internet-wide / Online resources For / software library / remarkable devices / i5 processor / software behaviors / certificate processing / plausible software configurations / naïve quadratic algorithm / user authentication protocol / headless devices / cryptographic algorithms / embedded network devices / remote access device / multiyear distributed-computing effort / network devices / enterprise-grade routers / computing / remote access devices / businessgrade phone/network routers / network exploration tool / consumer router / important cryptographic protocols / consumer routers / /

OperatingSystem

Linux / Ubuntu / CentOS / Fedora / FreeBSD / BSD / Red Hat Enterprise Linux / Microsoft Windows / /

Organization

University of Michigan / UCSD / IBM Remote Server Administration / /

Person

Eric Wustrow / /

Position

detective / representative / /

Product

II remote administration cards / Debian / Linux / Twisted / II / implementations / designs / /

ProgrammingLanguage

Python / /

ProvinceOrState

Virginia / Michigan / California / /

Technology

naïve quadratic algorithm / LAN / RAM / important cryptographic protocols / key exchange protocol / relational database / Linux / VPN / i5 processor / private key / one router / operating system / specific cryptographic algorithms / SSL / operating systems / Access businessgrade phone/network routers / GCD algorithm / TCP/IP / consumer-grade DSL routers / cryptography / public key / important cryptographic transport protocols / thin client / consumer router / SSH user authentication protocol / HTTP / consumer routers / IPv4 / VOIP / quasilinear-time algorithm / Gigaset DSL routers / enterprise-grade routers / /

SocialTag