Read this article:
http://arstechnica.com/security/2016...f-crypto-keys/
The use of 1024 bit prime number keys in Diffie-Hellman key exchanges can be compromised, making solving the key pair much easier.
The problem, explained in the article, is that only a few actual prime numbers used and these can be compromised by having an embedded "trapdoor".
If your software or your bank's software for instance, uses the 1024 bit keys, it may be breakable.
Even Apache Servers use a limited set of 1024 bit primes for generating security keys.
Watch for this to change, hopefully in the very near future. A move to 2048 bit keys is suggested in the article.
http://arstechnica.com/security/2016...f-crypto-keys/
The use of 1024 bit prime number keys in Diffie-Hellman key exchanges can be compromised, making solving the key pair much easier.
The problem, explained in the article, is that only a few actual prime numbers used and these can be compromised by having an embedded "trapdoor".
If your software or your bank's software for instance, uses the 1024 bit keys, it may be breakable.
Even Apache Servers use a limited set of 1024 bit primes for generating security keys.
Watch for this to change, hopefully in the very near future. A move to 2048 bit keys is suggested in the article.
Comment