Practical State Recovery Attacks Against Legacy RNG Implementations
Offered By: Association for Computing Machinery (ACM) via YouTube
Course Description
Overview
Explore a systematic study of vulnerabilities in FIPS 140-2 certified products implementing the ANSI X9.31 random number generator. Delve into the discovery of twelve products using static, hard-coded keys in source code, exposing them to potential attacks. Examine the implications for manufacturers, TLS protocols, and overall security. Learn why this research matters and gain insights into practical state recovery attacks against legacy RNG implementations in this 23-minute conference talk presented at the Association for Computing Machinery (ACM).
Syllabus
Introduction
Background
Manufacturers
TLS
Why Care
Summary
Taught by
Association for Computing Machinery (ACM)
Related Courses
Developing APIs with Google Cloud's Apigee API PlatformGoogle Cloud via Coursera Play by Play: Authenticating External App and Service Integrations with Salesforce
Pluralsight Introduction to Application Security Course (How To)
Treehouse API Security on Google Cloud's Apigee API Platform
Pluralsight Analyzing Network Protocols with Wireshark
Pluralsight