TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) [pdf]

65 pointsby remxabout 8 years ago

4 comments

adzmabout 8 years ago
FYI this is logjam from 2015 but still relevant.<p><a href="https:&#x2F;&#x2F;weakdh.org" rel="nofollow">https:&#x2F;&#x2F;weakdh.org</a>
Bugeabout 8 years ago
I&#x27;ve said this before, but there&#x27;s something I don&#x27;t like about this paper: it covers essentially 2 different things. That makes it confusing for people to try to understand or summarize.<p>One part is the Logjam protocol flaw in TLS.<p>The other is the mathematical precomputation attack against DH. It would cost $100M (well within NSA&#x27;s budget) and matches capabilities show in Snowden slides. This seems to me like the more important half of the paper, but all the media focused on the Logjam half.
评论 #14354650 未加载
评论 #14339132 未加载
rnabelabout 8 years ago
(Related) How to Backdoor Diffie-Hellman<p>Discussion which contains a number of good comments about weakening DH: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11973365" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11973365</a><p>Paper: <a href="http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;644" rel="nofollow">http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;644</a>
zshrdluabout 8 years ago
I wonder whether implementations follow x9.42 parameter generation algorithm?