Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Diffie-Hellman key exchange and its vulnerabilities in this 21-minute Devoxx conference talk. Delve into the fundamental role of this public-key cryptographic method in Internet security protocols like IPsec, SSH, and TLS. Discover how maliciously generated group parameters can compromise the security of Diffie-Hellman implementations, as exemplified by the CVE-2016-0701 vulnerability in OpenSSL. Examine the controversial RFC 5114 and its impact on OpenSSL's susceptibility to Key Recovery Attacks. Learn about public key cryptography, discrete log functions, and the importance of safe primes in cryptographic implementations. Gain insights into HTTPS functionality, OpenSSL vulnerabilities, and validation techniques to enhance your understanding of cryptographic defense mechanisms.
Syllabus
Intro
About me
What is TLS
How does TLS work
What are the actors looking into
Dont get dependent
What we need to know
Public key cryptography
Discrete log function
Analogic logarithm
How HTTPS works
Openssl vulnerability
Openssl mistakes
Openssl validation
Safe primes
I look weird
I can screw this
F35114
HP5114
Question
Taught by
Devoxx