Chapter 12 - Practical Problems with DH Flashcards

1
Q

What is the Logjam attack?

A
  • Exploits the fact, that safe primes have to be chosen in DH
  • Uses TLS-DHE-Export 512 bit primes instead 1024 bit primes
  • Attacker actively downgrades user capabilities
  • Then cracks key in realtime using a pre-computed database with the logarithms for the most common primes
  • Use key to sign finish message at the end of handshake
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are ways to prevent a logjam attack?

A
  • Use EC-DH
  • Increase prime size to 2048 bit
  • Use new 1024 primes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly