Weak Keys in the Wild
Read the following papers and write a summary of your understanding.
- “Ron was wrong, Whit is right” by Lenstra et al. presented at Crypto 2012. Available at: https://eprint.iacr.org/2012/064.pdf
- “Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices” by Heninger et al. presented at USENIX Security 2012. Available at: https://factorable.net/weakkeys12.extended.pdf