Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Practical State Recovery Attacks Against Legacy RNG Implementations

Association for Computing Machinery (ACM) via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a systematic study of vulnerabilities in FIPS 140-2 certified products implementing the ANSI X9.31 random number generator. Delve into the discovery of twelve products using static, hard-coded keys in source code, exposing them to potential attacks. Examine the implications for manufacturers, TLS protocols, and overall security. Learn why this research matters and gain insights into practical state recovery attacks against legacy RNG implementations in this 23-minute conference talk presented at the Association for Computing Machinery (ACM).

Syllabus

Introduction
Background
Manufacturers
TLS
Why Care
Summary

Taught by

Association for Computing Machinery (ACM)

Reviews

Start your review of Practical State Recovery Attacks Against Legacy RNG Implementations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.