Uncovering Hidden Backdoors in Diffie-Hellman: Insights from DEF CON 24 ๐Ÿ”

Explore how recent cryptographic backdoors like Dual-EC threaten security and learn techniques to identify vulnerabilities in Diffie-Hellman protocols, presented by David Wong at DEF CON 24.

Uncovering Hidden Backdoors in Diffie-Hellman: Insights from DEF CON 24 ๐Ÿ”
DEFCONConference
4.7K views โ€ข Nov 3, 2016
Uncovering Hidden Backdoors in Diffie-Hellman: Insights from DEF CON 24 ๐Ÿ”

About this video

Lately, several backdoors in cryptographic constructions, protocols and implementations have been surfacing in the wild: Dual-EC in RSA's B-Safe product, a modified Dual-EC in Juniper's operating system ScreenOS and a non-prime modulus in the open-source tool socat. Many papers have already discussed the fragility of cryptographic constructions not using nothing-up-my-sleeve numbers, as well as how such numbers can be safely picked. However, the question of how to introduce a backdoor in an already secure, safe and easy to audit implementation has so far rarely been researched (in the public).

BIO: David Wong (Twitter: @lyon01_david) is a Security Consultant at the Cryptography Services team of NCC Group. He has been working in Security for over a year now, being part of several publicly funded open source audits such as the OpenSSL and the Let's Encrypt ones. He has conducted research in many domains in cryptography, publishing whitepapers as well as writing numerous editions of the Cryptography Services private bulletin. He has been a trainer for cryptography courses at BlackHat US 2015 and BlackHat US 2016.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

4.7K

Likes

62

Duration

38:24

Published

Nov 3, 2016

User Reviews

4.4
(4)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.

Trending Now