Guest User

Untitled

a guest
Mar 19th, 2018
128
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.16 KB | None | 0 0
  1. Diffie-Hellman group 1 - 768 bit modulus - AVOID
  2. Diffie-Hellman group 2 - 1024 bit modulus - AVOID
  3. Diffie-Hellman group 5 - 1536 bit modulus - AVOID
  4. Diffie-Hellman group 14 - 2048 bit modulus – MINIMUM ACCEPTABLE
  5. Diffie-Hellman group 19 - 256 bit elliptic curve – ACCEPTABLE
  6. Diffie-Hellman group 20 - 384 bit elliptic curve – Next Generation Encryption
  7. Diffie-Hellman group 21 - 521 bit elliptic curve – Next Generation Encryption
  8. Diffie-Hellman group 24 - modular exponentiation group with a 2048-bit modulus and 256-bit prime order subgroup – Next Generation Encryption
  9.  
  10. Algorithms marked as AVOID do not provide an adequate security level against modern threats and should not be used to protect sensitive information. It is recommended that these algorithms be replaced with stronger algorithms.
  11.  
  12. Next Generation Encryption (NGE) is expected to meet the security and scalability requirements of the next two decades.
  13.  
  14. If you are using encryption or authentication algorithms with a 128-bit key, use Diffie-Hellman groups 5, 14, 19, 20 or 24. If you are using encryption or authentication algorithms with a 256-bit key or higher, use Diffie-Hellman group 21 or 24.
Add Comment
Please, Sign In to add comment