Uncovering Weak Encryption Keys in Network Devices π
Discover how researchers identify widespread weak cryptographic keys in network hardware, highlighting security vulnerabilities and the need for stronger encryption practices.

USENIX
4.8K views β’ Oct 10, 2012

About this video
Nadia Heninger, UC San Diego; Zakir Durumeric, University of Michigan; Eric Wustrow and J. Alex Halderman, University of Michigan
Awarded Best Paper at USENIX Security '12!
Awarded Best Paper at USENIX Security '12!
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
4.8K
Likes
64
Duration
31:01
Published
Oct 10, 2012
User Reviews
4.4
(4) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.