, HTTPS Top Million w/ active downgrade, vol.45
, HTTPS Top Million
, 8%) 3,410,000 (23.8%) HTTPS Trusted 1,000 (0.0%), HTTPS Trusted w/ active downgrade 489,000 (3.4%) 556,000 (3.9%) 1, vol.840, p.0
, We used Internet-wide scanning to estimate the number of real-world servers for which typical connections could be compromised by attackers with various levels of computational resources. For HTTPS, we provide figures with and without downgrade attacks on the chosen ciphersuite. All others are passive attacks. 19. The CADO-NFS Development Team. CADO-NFS, an implementation of the number field sieve algorithm, p.2017
Subquadratic computation of vector generating polynomials and improvement of the block Wiedemann algorithm, J. Symbolic Comput, vol.33, pp.757-775, 2002. ,
, Fielded capability: End-to-end VPN SPIN 9 design review. Media
, Intro to the VPN exploitation process. Media leak, 2010.
, SPIN 15 VPN story
A messy state of the union: Taming the composite state machines of TLS, IEEE Symposium on Security and Privacy, 2009. ,
New record for discrete logarithm in a prime finite field of 180 decimal digits, 2014. ,
Security analysis of IKE's signature-based key-exchange protocol, Crypto, 2002. ,
Solving linear equations over GF(2) via block Wiedemann algorithm, Math. Comp, vol.62, p.205, 1994. ,
DOI : 10.2307/2153413
New directions in cryptography, IEEE Trans. Inform. Theory, vol.22, pp.644-654, 1976. ,
DOI : 10.1109/tit.1976.1055638
ZMap: Fast Internet-wide scanning and its security applications, Usenix Security, 2013. ,
Improved routing-based linear algebra for the number field sieve, Information Technology: Coding and Computing, 2005. ,
DOI : 10.1109/itcc.2005.173
URL : http://www.wisdom.weizmann.ac.il/~tromer/papers/lawrap.pdf
Non-wafer-scale sieving hardware for the NFS: Another attempt to cope with 1024-bit, Eurocrypt, 2007. ,
Discrete logarithms in GF(p) using the number field sieve ,
, Discrete Math, vol.6, p.1, 1993.
The Internet key exchange (IKE). RFC 2409, 1998. ,
Improvements to the general number field sieve for discrete logarithms in prime fields. A comparison with the Gaussian integer method, Math. Comp, vol.72, pp.953-967, 2003. ,
URL : https://hal.archives-ouvertes.fr/hal-01102016
Factorization of a 768-bit RSA modulus, Crypto, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00444693
Computation of a 768-bit prime field discrete logarithm, 2017. ,
Semiconductors: Moore stress = structural industry shift, 2012. ,
Analysis of the Internet key exchange protocol using the NRL protocol analyzer, IEEE Symposium on Security and Privacy, 1999. ,
The Oakley key determination protocol. RFC 2412, 1998. ,
Virtual logarithms, J. Algorithms, vol.57, pp.140-147, 2005. ,