Главная
Study mode:
on
1
Intro
2
Background
3
SSH backdoor
4
Dual EC
5
How Dual EC Works
6
How to Mount the Attack
7
How Juniper Used Dual EC
8
Questions
9
Decompiled Output
10
Phase 1 Key Exchange
11
Phase 2 Nonce
12
Multiple handshake key recovery
13
Not skews
14
Single handshake key recovery
15
Single handshake key degradation
16
Proof of concept
17
Version history
18
Dual EC output
19
Dual EC state recovery
20
Dual EC receding bug
21
Backdoor
22
Answers
23
QA
Description:
Delve into a comprehensive analysis of the Juniper Dual EC incident in this 28-minute conference talk presented at CCS 2016. Explore the background of SSH backdoors and the Dual EC cryptographic algorithm, understanding its functionality and vulnerabilities. Learn how attackers can exploit Dual EC and examine Juniper's specific implementation. Gain insights into decompiled output, key exchange processes, and nonce generation. Investigate multiple handshake key recovery techniques, single handshake key recovery and degradation, and proof of concept demonstrations. Trace the version history of affected systems and analyze the Dual EC output and state recovery. Uncover the intricacies of the Dual EC receding bug and its implications as a potential backdoor. Conclude with a Q&A session addressing audience inquiries on this critical cybersecurity incident.

A Systematic Analysis of the Juniper Dual EC Incident

Association for Computing Machinery (ACM)
Add to list
0:00 / 0:00