Cryptographic attacks | Attacks on public-key cryptosystems

ROCA vulnerability

The ROCA vulnerability is a cryptographic weakness that allows the private key of a key pair to be recovered from the public key in keys generated by devices with the vulnerability. "ROCA" is an acronym for "Return of Coppersmith's attack". The vulnerability has been given the identifier CVE-2017-15361. The vulnerability arises from a problem with an approach to RSA key generation used in vulnerable versions of a software library, RSALib, provided by Infineon Technologies, and incorporated into many smart cards, Trusted Platform Module (TPM), and Hardware Security Modules (HSM) implementations, including YubiKey 4 tokens, often used to generate PGP keys. Keys of lengths 512, 1024, and 2048 bits generated using these versions of the Infineon library are vulnerable to a practical ROCA attack. The research team that discovered the attack (all with Masaryk University and led by Matúš Nemec and Marek Sýs) estimate that it affected around one-quarter of all current TPM devices globally. Millions of smart cards are believed to be affected. The team informed Infineon of the RSALib problem in February 2017, but withheld public notice until mid-October, citing responsible disclosure. At that time they announced the attack and provided a tool to test public keys for vulnerability. They published the details of the attack in November. (Wikipedia).

Video thumbnail

Reliability 1: External reliability and rater reliability and agreement

In this video, I discuss external reliability, inter- and intra-rater reliability, and rater agreement.

From playlist Reliability analysis

Video thumbnail

Digital security - threats, risks and how to protect yourself | Part I

Support this channel on Patreon https://www.patreon.com/thehatedone Part I of the full talk with Daniel from Safing.io. We discuss the current state of digital security, most common threats, GDPR, artificial intelligence and quantum computing. Monero: 84DYxU8rPzQ88SxQqBF6VBNfPU9c5sjDXfTC

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

Which Incapacitating Agent is the Most Effective?

This time, we're ranking incapacitating agents! The term incapacitating agent is defined by the United States Department of Defense as: "An agent that produces temporary physiological or mental effects, or both, which will render individuals incapable of concerted effort in the performance

From playlist Chemistry Tierlists

Video thumbnail

Rescuing Mussolini 1943 - Skorzeny's Forgotten Second Mission

The 1943 rescue of Italian dictator Benito Mussolini from atop the Gran Sasso mountain is well known, but not so the secondary operation launched by one of Otto Skorzeny's SS officers to rescue Mussolini's wife and children from a castle. Dr. Mark Felton is a well-known British historian

From playlist Daring Raids

Video thumbnail

ASU Class of 2016 - Outstanding Graduate students | Arizona State University

Meet the outstanding graduate students of Arizona State University's Class of 2016.

From playlist Graduation at ASU

Video thumbnail

Week 3 X-Posed | Naked and Afraid XL

More victories, more disappointments, one more tap out. Here’s the recap of this week’s Naked And Afraid XL. | http://www.discovery.com/tv-shows/naked-and-afraid-xl/ Catch NAKED AND AFRAID XL Sundays at 10/9c on Discovery! Subscribe to Discovery: http://www.youtube.com/subscription_cente

From playlist Naked and Afraid XL

Video thumbnail

Diversity of life (2), basal animals (porifera, ctenophora, and cnidaria)

This video describes the major categories of animals and some of the defining synapomorphies. It then provides a broad overview of the following groups: porifera, ctenophora, and cnidaria.

From playlist TAMU: Bio 312 - Evolution | CosmoLearning Biology

Video thumbnail

CERIAS Security: The dark side of software engineering and how to defend against it 2/5

Clip 2/5 Speaker: Cassio Goldschmidt If you create an application that runs on one or more computers connected to a network such as the internet, your code will be attacked. Consequences of compromised systems often include loss of trust, reputation and revenue. Software will always hav

From playlist The CERIAS Security Seminars 2009

Video thumbnail

National Birds of South America - Aves nacionales de Sudamérica

Kristof Zyskowski, Manager of Bird and Mammal Collection In South America, the following species are the official national birds: Andean Condor in Colombia, Ecuador, Bolivia, and Chile, Venezuelan Troupial in Venezuela, Andean Cock-of-the-rock in Peru, Hoatzin in Guyana, Great Kiskadee in

From playlist Yale Peabody Museum ¡Fiesta Latina!

Video thumbnail

Staysafe.org: Protect your computer

The Internet is a global network that connects us to limitless information and opportunities. But there are risks involved with connecting to the Internet, such as downloading viruses and spyware onto computers and devices. Watch this video for four easy steps to help protect your computer

From playlist awareness

Video thumbnail

Ruby Conf 2013 - Being Boring: A Survival Guide to Ruby Cryptography

We all know that security is hard, and that math is hard, but what happens when you put them together? Cryptography is an increasingly essential tool for building secure systems, but also a perilous minefield where any number of mistakes can lead to insecure systems. This talk will take y

From playlist Ruby Conf 2013 - Miami Beach, FL

Video thumbnail

Risk Assessment: Likelihood Determination

http://trustedci.org/ Determining Likelihood of a threat as part of a cyber risk assessment.

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

Low Default Portfolios (Part 1)

A Low Default Portfolio (LDP) is a portfolio characterized by a low number of defaults. Too simple? Citing the BCBS (Basel Committee on Banking Supervision): Several types of portfolios may have low numbers of defaults. For example, some portfolios historically have experienced low numb

From playlist Topics in Credit Risk Modelling

Video thumbnail

Turtle Dance | National Geographic

Green turtles gather near Dirty Rock, Roca Sucia, off Cocos Island's north coast. ➡ Subscribe: http://bit.ly/NatGeoSubscribe About National Geographic: National Geographic is the world's premium destination for science, exploration, and adventure. Through their world-class scientists, pho

From playlist Ocean Now | National Geographic

Video thumbnail

eurucamp 2015 - mruby: a Packaging Story Filled with Freedom by Terence Lee

mruby: a Packaging Story Filled with Freedom by Terence Lee Ruby is a great language for building CLIs. There’s an amazing selection of existing libraries like Thor, GLI, or even OptionParser. You probably use a number of Ruby tools everyday like chef, the heroku toolbelt, , and of course

From playlist eurucamp 2015

Video thumbnail

QRM L1-1: The Definition of Risk

Welcome to Quantitative Risk Management (QRM). In this first class, we define what risk if for us. We will discuss the basic characteristics of risk, underlining some important facts, like its subjectivity, and the impossibility of separating payoffs and probabilities. Understanding the d

From playlist Quantitative Risk Management

Video thumbnail

Week 1 X-Posed | Naked and Afraid XL

From survivalists arrivals to a tap out, this week’s Naked And Afraid XL had it all! Here are the highlights and lowlights from the premiere episode. | http://www.discovery.com/tv-shows/naked-and-afraid-xl/ Catch NAKED AND AFRAID XL Sundays at 10/9c on Discovery! Subscribe to Discovery:

From playlist Naked and Afraid XL

Video thumbnail

CERIAS Security: Software Assurance: Motivation, Background, and Acquisition Pursuits 2/6

Clip 2/6 Speaker: Joe Judge · Mitre This Software Assurance (SwA) is a slightly different spin on the SwA presentation and discussion. The need for measurable SwA, for the purposes of presenting and assurance "case" and explained with a practitioner's point of view. Current pursuits and

From playlist The CERIAS Security Seminars 2009

Video thumbnail

Eddie Chumney in Finland 2012-05-06 PART 7/8

Eddie Chumney is one of the leading Torah teachers in the Hebraic Roots community of Messianic bible-believers today. We had the privilege and honor to have him as a guest in Finland in May 2012, and we organized a few meetings for him to speak in about Hebraic Roots of Christianity. I wil

From playlist Eddie Chumney @ Finland/Suomi @ 2012/5

Related pages

Prime number | Random number generation | Trusted Platform Module | BitLocker | Key generation | Pohlig–Hellman algorithm | Coppersmith method | Discrete logarithm | Public-key cryptography | Smooth number | Pretty Good Privacy | Cryptography | RSA (cryptosystem) | Coppersmith's attack