A Systematic Analysis of the Juniper Dual EC Incident
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Background
SSH backdoor
Dual EC
How Dual EC Works
How to Mount the Attack
How Juniper Used Dual EC
Questions
Decompiled Output
Phase 1 Key Exchange
Phase 2 Nonce
Multiple handshake key recovery
Not skews
Single handshake key recovery
Single handshake key degradation
Proof of concept
Version history
Dual EC output
Dual EC state recovery
Dual EC receding bug
Backdoor
Answers
QA
Taught by
ACM CCS