Главная
Study mode:
on
1
Introduction
2
Reality on the Internet
3
Scanners
4
DiffieHellman
5
Bruce Schneier
6
What is DiffieHellman
7
Cody the Coder
8
Whats wrong with this
9
Modular exponentiation
10
Chinese remainder theorem
11
Who screwed it up
12
Countermeasures
13
Primes
14
Prime Standards
15
Lemmle
16
Small subgroup confinement attacks
17
Countermeasure
18
Are you good
19
Bad implementation behavior
20
Crypto implementation flaws
21
Policy makers
22
US export controls
23
Backwards compatibility
24
Freak attack
25
Logjam
26
Why it works
27
The number field sieve algorithm
28
How long does it take
29
Lessons
30
Policy
31
NSA
32
Diffie Hellman
33
Snowden Documents
34
NSA Passive Decryption
35
NSA Decryption Requirements
36
DiffieHellman Key Sizes
37
Poor Users
38
The Good
39
The Problem
40
Free Speech
41
Open Internet
Description:
Explore an invited talk by Nadia Heninger at Asiacrypt 2016 delving into the practical realities of cryptographic deployments on the internet. Gain insights into the challenges and vulnerabilities in current cryptographic implementations, focusing on Diffie-Hellman key exchange. Examine the impact of scanners, modular exponentiation, and the Chinese remainder theorem on security. Investigate prime standards, small subgroup confinement attacks, and countermeasures. Analyze crypto implementation flaws, US export controls, and their consequences, including the FREAK and Logjam attacks. Learn about the number field sieve algorithm and its implications for cryptographic security. Discuss NSA's role in cryptography, including revelations from Snowden documents and NSA's decryption requirements. Reflect on the broader implications for internet security, free speech, and maintaining an open internet while addressing cryptographic challenges.

The Reality of Cryptographic Deployments on the Internet

TheIACR
Add to list
0:00 / 0:00