A Systematic Analysis of the Juniper Dual EC Incident

A Systematic Analysis of the Juniper Dual EC Incident

ACM CCS via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

A Systematic Analysis of the Juniper Dual EC Incident

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Background
  3. 3 SSH backdoor
  4. 4 Dual EC
  5. 5 How Dual EC Works
  6. 6 How to Mount the Attack
  7. 7 How Juniper Used Dual EC
  8. 8 Questions
  9. 9 Decompiled Output
  10. 10 Phase 1 Key Exchange
  11. 11 Phase 2 Nonce
  12. 12 Multiple handshake key recovery
  13. 13 Not skews
  14. 14 Single handshake key recovery
  15. 15 Single handshake key degradation
  16. 16 Proof of concept
  17. 17 Version history
  18. 18 Dual EC output
  19. 19 Dual EC state recovery
  20. 20 Dual EC receding bug
  21. 21 Backdoor
  22. 22 Answers
  23. 23 QA

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.