Conversation

Key exchange is what needs to be improved in the short term because that's what has to hold up to future attacks. It's already almost entirely ECDHE with ed25519 or in some cases still P-256. Only legacy setups still use RSA for key exchange because it lacks forward secrecy.
1
1
If you're using RSA certs with TLS 1.3, it doesn't matter if RSA is broken in 10 years. Does matter if x25519 is broken in 10 years. RSA is heavily used for update signing, etc. since P-256, ed25519, etc. are slower to verify. Common not to have easy key rotation for that too.
1
1
Show replies