• LordMayor@piefed.social
      link
      fedilink
      English
      arrow-up
      2
      ·
      4 days ago

      This account is on multiple instances and posts a ton of crap. Not sure what they’re trying to accomplish.

  • Zachariah@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    4 days ago

    For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from the US National Security Agency and other state-sponsored spies. Now, researchers are renewing their warning that a serious flaw in the way the key exchange is implemented is allowing the NSA to break and eavesdrop on trillions of encrypted connections.

    The cost for adversaries is by no means modest. For commonly used 1024-bit keys, it would take about a year and cost a “few hundred million dollars” to crack just one of the extremely large prime numbers that form the starting point of a Diffie-Hellman negotiation. But it turns out that only a few primes are commonly used, putting the price well within the NSA’s $11 billion-per-year budget dedicated to “groundbreaking cryptanalytic capabilities.”

  • slazer2au@lemmy.world
    link
    fedilink
    English
    arrow-up
    2
    ·
    4 days ago

    Tl;dr

    It is likely 512 and 1024 bit diffie Hellman primes are within the NSA budget to predict. Move to at least 2048.

    Or better yet move to an elliptic curve