Content deleted Content added
a few words on discovery of the exploit |
mNo edit summary |
||
Line 1:
'''Logjam''' is a [[security exploit]] against [[export of cryptography from the United States|US export-grade]] 512-bit keys in [[Diffie–Hellman key exchange|Diffie–Hellman key exchange]] cryptographic algorithm discovered by a group of computer scientists and publicly reported on May 20, 2015.<ref>{{cite web |url=https://weakdh.org |title=The Logjam Attack |website=weakdh.org |date=2015-05-20}}</ref><ref>{{cite web |url=http://arstechnica.com/security/2015/05/https-crippling-attack-threatens-tens-of-thousands-of-web-and-mail-servers/ |title=HTTPS-crippling attack threatens tens of thousands of Web and mail servers |author=Dan Goodin |publisher=[[Ars Technica]] |date=2015-05-20}}</ref><ref>{{cite web |url=http://phoronix.com/scan.php?page=news_item&px=HTTPS-Logjam-Vulnerability |title=Another HTTPS Vulnerability Rattles The Internet |author=Eric Griffith |publisher=[[Phoronix]] |date=2015-05-20}}</ref>
== See also ==
|