How is NSA breaking into VPNs?

Brian Gladman brg at gladman.plus.com
Fri Oct 16 17:29:05 BST 2015


An interesting paper on the weaknesses of DH key exchange protocols:

https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf




More information about the ukcrypto mailing list