On Thu, Jul 27, 2000 at 09:14:11AM -0700, [EMAIL PROTECTED] wrote:
> 
> A colleague asked yesterday "I wonder how much Diffie-Hellman is actually 
>used?", as we were sitting around talking about authentication (in particular) 
> and security (in general) protocols.
> 
>So I'm curious, are there any studies on what is actually deployed "out there" 
> and/or available in products -- qualified as the set of algorithms discussed 
> in Chapters 19 and 22 of Applied Cryptography 2nd Ed?
> 
> I suppose that a bunch of what's "out there" is under wraps and so data isn't 
> available, but commercial-off-the-shelf stuff generally touts what 
> algorithms/protocols it implements.


I just completed a survey of deployed SSL server security, and one of
the things I looked at is the support for the different ciphersuites.
While SSL/TLS != all crypto, it's probably the most common protocol, so
my results might give you some idea of how much DH and other algorithms
are supported.

I found that 38% of the servers in my study were insecure-
they used weak 40-bit ciphersuites, 512-bit or smaller keys, self-signed
certs or had an expired cert (or had more than one of these insecurities).
That's pretty awful.

http://www.lne.com/ericm/papers/ssl_servers.html

The stats for ciphersuites supported is on the 'detailed results' page
along with a list of the weak servers I found.    There's also
a form for checking the security of an SSL server.

-- 
  Eric Murray http://www.lne.com/ericm  ericm at lne.com  PGP keyid:E03F65E5
Security consulting: secure protocols, security reviews, standards, smartcards. 

Reply via email to