and consult other sources in support of your 6 page Critical Review Report.
Read Heninger, et. al (2012) Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices
and consult other sources in support of your 6 page Critical Review Report.