<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 12pt;
font-family:Calibri
}
--></style></head>
<body class='hmmessage'><div dir='ltr'>Hello<BR> <BR>Regarding the latest report concerning vulnerabilities in the Diffie-Hellman key Exchange [1] (short introduction in [2]) and the logjam attack [3], is there anyone with experience in securing encypted channels or end-to-end-encrypted channels using either 2048 bit keys or elliptic curve cryptography? Does anyone know to which extent there are brokers that support such level of cryptography? Or to what extent it is even legal to use such level of cryptography, and where?<BR> <BR>Best regards,<BR>Peter Waher<BR> <BR>[1] <a href="https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf">https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf</a><br>[2] <a href="https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#Practical_attacks_on_Internet_traffic">https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange#Practical_attacks_on_Internet_traffic</a><br>[3] <a href="https://en.wikipedia.org/wiki/Logjam_(computer_security">https://en.wikipedia.org/wiki/Logjam_(computer_security</a>)<BR>                                           </div></body>
</html>