Matches in DBpedia 2016-04 for { <http://wikidata.dbpedia.org/resource/Q19410276> ?p ?o }
Showing triples 1 to 51 of
51
with 100 triples per page.
- Q19410276 subject Q20926859.
- Q19410276 subject Q21831250.
- Q19410276 subject Q6121277.
- Q19410276 subject Q7210623.
- Q19410276 subject Q7583565.
- Q19410276 abstract "FREAK ("Factoring RSA Export Keys") is a security exploit of a cryptographic weakness in the SSL/TLS protocols introduced decades earlier for compliance with U.S. cryptography export regulations. These involved limiting exportable software to use only public key pairs with RSA moduli of 512 bits or less (so-called RSA_EXPORT keys), with the intention of allowing them to be broken easily by the NSA, but not by other organizations with lesser computing resources. However, by the early 2010s, increases in computing power meant that they could be broken by anyone with access to relatively modest computing resources using the well-known Number Field Sieve algorithm, using as little as $100 of cloud computing services. Combined with the ability of a man-in-the-middle to manipulate the initial cipher suite negotiation between the endpoints in the connection and the fact that the Finished hash only depended on the master secret, this meant that a man-in-the-middle, with only a modest amount of computation could break the security of any website that allowed the use of 512-bit export-grade keys. While the exploit was only discovered in 2015, its underlying vulnerabilities had been present for many years, dating back to the 1990s.".
- Q19410276 wikiPageExternalLink https_sites_that_support_rsa_export_suites.
- Q19410276 wikiPageExternalLink www.sitemeer.com.
- Q19410276 wikiPageExternalLink freak.
- Q19410276 wikiPageExternalLink www.freakattack.com.
- Q19410276 wikiPageExternalLink www.smacktls.com.
- Q19410276 wikiPageWikiLink Q1052790.
- Q19410276 wikiPageWikiLink Q11287.
- Q19410276 wikiPageWikiLink Q1135789.
- Q19410276 wikiPageWikiLink Q1144725.
- Q19410276 wikiPageWikiLink Q1146208.
- Q19410276 wikiPageWikiLink Q121194.
- Q19410276 wikiPageWikiLink Q1406.
- Q19410276 wikiPageWikiLink Q140770.
- Q19410276 wikiPageWikiLink Q14116.
- Q19410276 wikiPageWikiLink Q15700545.
- Q19410276 wikiPageWikiLink Q1575.
- Q19410276 wikiPageWikiLink Q16973176.
- Q19410276 wikiPageWikiLink Q181551.
- Q19410276 wikiPageWikiLink Q18274255.
- Q19410276 wikiPageWikiLink Q19984009.
- Q19410276 wikiPageWikiLink Q201339.
- Q19410276 wikiPageWikiLink Q206494.
- Q19410276 wikiPageWikiLink Q20926859.
- Q19410276 wikiPageWikiLink Q21831250.
- Q19410276 wikiPageWikiLink Q2283.
- Q19410276 wikiPageWikiLink Q3084134.
- Q19410276 wikiPageWikiLink Q312.
- Q19410276 wikiPageWikiLink Q35773.
- Q19410276 wikiPageWikiLink Q4049250.
- Q19410276 wikiPageWikiLink Q41242.
- Q19410276 wikiPageWikiLink Q483639.
- Q19410276 wikiPageWikiLink Q5421561.
- Q19410276 wikiPageWikiLink Q554830.
- Q19410276 wikiPageWikiLink Q6041359.
- Q19410276 wikiPageWikiLink Q6121277.
- Q19410276 wikiPageWikiLink Q627226.
- Q19410276 wikiPageWikiLink Q698.
- Q19410276 wikiPageWikiLink Q7210623.
- Q19410276 wikiPageWikiLink Q7455608.
- Q19410276 wikiPageWikiLink Q7583565.
- Q19410276 wikiPageWikiLink Q777.
- Q19410276 wikiPageWikiLink Q94.
- Q19410276 wikiPageWikiLink Q95.
- Q19410276 comment "FREAK ("Factoring RSA Export Keys") is a security exploit of a cryptographic weakness in the SSL/TLS protocols introduced decades earlier for compliance with U.S. cryptography export regulations. These involved limiting exportable software to use only public key pairs with RSA moduli of 512 bits or less (so-called RSA_EXPORT keys), with the intention of allowing them to be broken easily by the NSA, but not by other organizations with lesser computing resources.".
- Q19410276 label "FREAK".