• 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
1024 bit Diffie-Hellman key exchanges may be compromised.

#1
Read this article:
Quote: http://arstechnica.com/security/2016...f-crypto-keys/

The use of 1024 bit prime number keys in Diffie-Hellman key exchanges can be compromised, making solving the key pair much easier.

The problem, explained in the article, is that only a few actual prime numbers used and these can be compromised by having an embedded "trapdoor".

If your software or your bank's software for instance, uses the 1024 bit keys, it may be breakable.

Even Apache Servers use a limited set of 1024 bit primes for generating security keys.

Watch for this to change, hopefully in the very near future. A move to 2048 bit keys is suggested in the article.
I'm posting this here because we write the software...
If your software needs to interface with secure systems (HTTPS) then you may need to look closely at how trustworthy those systems are, now.
CI 3.1 Kubuntu 19.04 Apache 5.x  Mysql 5.x PHP 5.x PHP 7.x
Remember: Obfuscation is a bad thing.
Clarity is desirable over Brevity every time.
Reply


Digg   Delicious   Reddit   Facebook   Twitter   StumbleUpon  


Users browsing this thread:
1 Guest(s)


  Theme © 2014 iAndrew  
Powered By MyBB, © 2002-2019 MyBB Group.