BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Memento EPFL//
BEGIN:VEVENT
SUMMARY:IC Colloquium - How not to generate random numbers
DTSTART:20131216T161500
DTEND:20131216T173000
DTSTAMP:20260407T025915Z
UID:00336e3532303c923fdba57f5f03b7cb9bf8d821ba64578f642f5490
CATEGORIES:Conferences - Seminars
DESCRIPTION:Nadia Heninger\, University of Pennsylvania\nAbstract:\nRandom
 ness is essential to cryptography: cryptographic security depends on priva
 te keys that are unpredictable to an attacker. But how good are the random
  number generators that are actually used in practice?  In this talk\, I 
 will discuss several large-scale surveys of cryptographic deployments\, in
 cluding TLS\, SSH\, Bitcoin\, and secure smart cards\, and show that rando
 m number generation flaws are surprisingly widespread. We will see how man
 y of the most commonly used public key encryption and signature schemes ca
 n fail catastrophically if used with faulty random number generators\, and
  trace many of the the random number generation flaws we encountered to sp
 ecific implementations and vulnerable implementation patterns.Biography:\n
 Nadia Heninger is an assistant professor in the Computer and Information S
 cience department at the University of Pennsylvania.  Her research focuse
 s on security\, applied cryptography\, and algorithms. She is best known f
 or her work identifying widespread entropy problems in cryptographic keys 
 on the Internet (2012 Usenix Security best paper award)\, and developing t
 he "cold boot" attack against disk encryption systems (2008 Usenix Securit
 y best student paper award).  Previously\, she was an NSF Mathematical Sc
 iences Postdoctoral Fellow at UC San Diego and a visiting researcher at Mi
 crosoft Research New England. She received her Ph.D. in computer science i
 n 2011 from Princeton and a B.S. in electrical engineering and computer sc
 ience in 2004 from UC Berkeley.
LOCATION:BC 420 https://plan.epfl.ch/?room==BC%20420
STATUS:CONFIRMED
END:VEVENT
END:VCALENDAR
