Assessing And Exploiting BigNum Vulnerabilities

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=x2zW8M5ARlo



Duration: 49:01
5 views
1


The majority of deployed asymmetric cryptography implementations (RSA, DH, ECDH/ECDSA with GF(p) curves) need to perform calculations on integers that are larger than a single machine word. Just like every software package, implementations of multi-precision integer arithmetic sometimes have bugs. This talk investigates the implications of these bugs and shows how they can be used by attackers to exploit asymmetric cryptographic primitives. Isolating bug patterns and understanding exploitation requirements allows us to develop strategies for automated bug hunting.

PRESENTED BY
Ralf-Philipp Weinmann

Black Hat - USA - 2015 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security







Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
information
hack
online
password
code
concept
protection
network
malware
secure
identity
software
access
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Ralf-Philipp Weinmann
assessing
exploiting
BigNum
vulnerabilities