作者: Lin-Shung Huang , Shrikant Adhikarla , Dan Boneh , Collin Jackson
DOI: 10.1109/MIC.2014.86
关键词:
摘要: Many Transport Layer Security (TLS) servers use the ephemeral Diffie-Hellman (DHE) key exchange to support forward secrecy. However, in a survey of 473,802 TLS servers, authors found that 82.9 percent DHE-enabled weak DH parameters, resulting false sense security. They compared server throughput various setups, and measured real-world client-side latencies using an advertisement network. Their results indicate secrecy is no harder, can even be faster elliptic curve cryptography (ECC), than