Videos Assessing And Exploiting BigNum Vulnerabilities

Published on December 29th, 2015 📆 | 2798 Views ⚑


Assessing And Exploiting BigNum Vulnerabilities

by Ralf-Philipp Weinmann

The majority of deployed asymmetric cryptography implementations (RSA, DH, ECDH/ECDSA with GF(p) curves) need to perform calculations on integers that are larger than a single machine word. Just like every software package, implementations of multi-precision integer arithmetic sometimes have bugs. This talk investigates the implications of these bugs and shows how they can be used by attackers to exploit asymmetric cryptographic primitives. Isolating bug patterns and understanding exploitation requirements allows us to develop strategies for automated bug hunting.

2015-12-29 18:55:45


Download Nulled WordPress Themes
Download Best WordPress Themes Free Download
Download WordPress Themes
Download WordPress Themes Free
free download udemy course

Tagged with:

Leave a Reply ✍