- Aug 30, 2012
- 6,598
In the wake of the NSA spying program, it appears that the network may not be as private as we thought. Robert Graham, a security researcher, has concluded that three quarters of all Tor nodes use only 1024-bit Diffie-Hellman keys, and it's generally agreed upon that the NSA can crack these keys in hours using dedicated hardware. The latest release candidate for Tor, version 2.4, switches from the standard Diffie-Hellman key exchange to ECDHE, which are Elliptical-Curve Diffie-Hellman keys, which may greatly increase the privacy of the Tor network. Unfortunately, this version is not yet finalized and may not be as stable as the current release.
Of course there's no guarantee that the NSA hasn't already found an easy way to crack ECDHE, but considering it's not currently as common as other encryption techniques, for now there's a greater chance that it's more secure.
source
Of course there's no guarantee that the NSA hasn't already found an easy way to crack ECDHE, but considering it's not currently as common as other encryption techniques, for now there's a greater chance that it's more secure.
source