YoVDO

Practical State Recovery Attacks Against Legacy RNG Implementations

Offered By: Association for Computing Machinery (ACM) via YouTube

Tags

Cryptography Courses Cybersecurity Courses System Security Courses TLS Courses

Course Description

Overview

Explore a systematic study of vulnerabilities in FIPS 140-2 certified products implementing the ANSI X9.31 random number generator. Delve into the discovery of twelve products using static, hard-coded keys in source code, exposing them to potential attacks. Examine the implications for manufacturers, TLS protocols, and overall security. Learn why this research matters and gain insights into practical state recovery attacks against legacy RNG implementations in this 23-minute conference talk presented at the Association for Computing Machinery (ACM).

Syllabus

Introduction
Background
Manufacturers
TLS
Why Care
Summary


Taught by

Association for Computing Machinery (ACM)

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network