Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a systematic study of vulnerabilities in FIPS 140-2 certified products implementing the ANSI X9.31 random number generator. Delve into the discovery of twelve products using static, hard-coded keys in source code, exposing them to potential attacks. Examine the implications for manufacturers, TLS protocols, and overall security. Learn why this research matters and gain insights into practical state recovery attacks against legacy RNG implementations in this 23-minute conference talk presented at the Association for Computing Machinery (ACM).