Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Contents
Key points..................................................................................................................2
Follow up...................................................................................................................2
Significant referenced sources...................................................................................2
What methods are used to carry Evaluation of the Research Design: gather certs from live
out research servers, check key strength and vulnerabilities, geolocate
Are there aspects of the design Evaluation of the Research Design: yes
that could be applied to your
work?
Are the results well displayed Evaluation of Data Presentation: limited
and clear?
Are the results in keeping with Evaluation of the Research Results: yes
the design?
Are the implications of the Evaluation of the Research Results: yes
study clear?
Have the results been Evaluation of further calls for research: limited
appropriately discussed?
06/02/17 Holmes & Gordon & Cahill /Research Methods 6/02/17 p. 2
Key points
The article is from 2013 conference paper based on MSc thesis by the author.
Discusses testing of SSL key strength in a large database of live servers - very
large numbers (6,248,784 distinct domain names, 1,713,388 (27.42% of the
original .com and .co set) SSL-enabled servers.
Used multi-threaded java code might be more difficult than I thought to do
the scripting
Use geo loation rather than alexa to locate servers this is physical location
based on IP range does not necessarily correlate to my plan - .ie domains can
be hosted internationally
Follow up
Look at the key strength recommendations and
[19] A. Lenstra (2004, June), Key Lengths [Online]. Available FTP: ftp://cm.bell-
labs.com/who/akl/key_lengths.pdf
[19] A. Lenstra (2004, June), Key Lengths [Online]. Available FTP: ftp://cm.bell-
labs.com/who/akl/key_lengths.pdf