TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice (2015) [pdf]

65 点作者 remx大约 8 年前

4 条评论

adzm大约 8 年前
FYI this is logjam from 2015 but still relevant.<p><a href="https:&#x2F;&#x2F;weakdh.org" rel="nofollow">https:&#x2F;&#x2F;weakdh.org</a>
Buge大约 8 年前
I&#x27;ve said this before, but there&#x27;s something I don&#x27;t like about this paper: it covers essentially 2 different things. That makes it confusing for people to try to understand or summarize.<p>One part is the Logjam protocol flaw in TLS.<p>The other is the mathematical precomputation attack against DH. It would cost $100M (well within NSA&#x27;s budget) and matches capabilities show in Snowden slides. This seems to me like the more important half of the paper, but all the media focused on the Logjam half.
评论 #14354650 未加载
评论 #14339132 未加载
rnabel大约 8 年前
(Related) How to Backdoor Diffie-Hellman<p>Discussion which contains a number of good comments about weakening DH: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11973365" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=11973365</a><p>Paper: <a href="http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;644" rel="nofollow">http:&#x2F;&#x2F;eprint.iacr.org&#x2F;2016&#x2F;644</a>
zshrdlu大约 8 年前
I wonder whether implementations follow x9.42 parameter generation algorithm?