Zum Inhalt springen

Kategorie:Diffie Hellman: Unterschied zwischen den Versionen

Aus Foxwiki
Die Seite wurde neu angelegt: „A common question is which Diffie-Hellman (DH) parameters should be used for Diffie Hellman key-exchanges https://bettercrypto.org/#_footnotedef_31 31. * We follow the recommendations in ECRYPT II ([https://bettercrypto.org/#bibliography-default-ii2011ecrypt II & SYM, 2012]). Where configurable, we recommend using the Diffie Hellman groups defined for IKE, specifically groups 14-18 (2048–8192 bit MODP) ([https://bettercrypto.org/#bibliography-defau…“
 
Keine Bearbeitungszusammenfassung
Zeile 1: Zeile 1:
A common question is which Diffie-Hellman (DH) parameters should be used for Diffie Hellman key-exchanges [[https://bettercrypto.org/#_footnotedef_31 31]].
: Which Diffie-Hellman (DH) parameters should be used
* We follow the recommendations in ECRYPT II ([https://bettercrypto.org/#bibliography-default-ii2011ecrypt II & SYM, 2012]).
for Diffie Hellman key-exchanges [[https://bettercrypto.org/#_footnotedef_31 31]]
Where configurable, we recommend using the Diffie Hellman groups defined for IKE, specifically groups 14-18 (2048–8192 bit MODP) ([https://bettercrypto.org/#bibliography-default-rfc3526 Kivinen & Kojo, 2003]).  
 
We follow the recommendations in ECRYPT II ([https://bettercrypto.org/#bibliography-default-ii2011ecrypt II & SYM, 2012]).
* Where configurable, we recommend using the Diffie Hellman groups defined for IKE, specifically groups 14-18 (2048–8192 bit MODP) ([https://bettercrypto.org/#bibliography-default-rfc3526 Kivinen & Kojo, 2003]).  
* These groups have been checked by many eyes and can be assumed to be secure.
* These groups have been checked by many eyes and can be assumed to be secure.
For convenience, we provide these parameters as PEM files on our webserver [[https://bettercrypto.org/#_footnotedef_32 32]].
For convenience, we provide these parameters as PEM files on our webserver [[https://bettercrypto.org/#_footnotedef_32 32]].

Version vom 1. Januar 2023, 17:43 Uhr

Which Diffie-Hellman (DH) parameters should be used
  • for Diffie Hellman key-exchanges [31]

We follow the recommendations in ECRYPT II (II & SYM, 2012).

  • Where configurable, we recommend using the Diffie Hellman groups defined for IKE, specifically groups 14-18 (2048–8192 bit MODP) (Kivinen & Kojo, 2003).
  • These groups have been checked by many eyes and can be assumed to be secure.

For convenience, we provide these parameters as PEM files on our webserver [32].