Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Systematic Analysis of the Juniper Dual EC Incident
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Background
- 3 SSH backdoor
- 4 Dual EC
- 5 How Dual EC Works
- 6 How to Mount the Attack
- 7 How Juniper Used Dual EC
- 8 Questions
- 9 Decompiled Output
- 10 Phase 1 Key Exchange
- 11 Phase 2 Nonce
- 12 Multiple handshake key recovery
- 13 Not skews
- 14 Single handshake key recovery
- 15 Single handshake key degradation
- 16 Proof of concept
- 17 Version history
- 18 Dual EC output
- 19 Dual EC state recovery
- 20 Dual EC receding bug
- 21 Backdoor
- 22 Answers
- 23 QA