Logjam attack

GPTKB entity

Statements (24)
Predicate Object
gptkbp:instanceOf cyber attack
gptkbp:allows man-in-the-middle attacks
gptkbp:associated_with encryption vulnerabilities
gptkbp:can_be weaknesses in cryptographic protocols
gptkbp:controls enforcing strong cipher suites
using strong parameters
gptkbp:documentedIn security advisories
https://www.w3.org/2000/01/rdf-schema#label Logjam attack
gptkbp:impact HTTPS traffic
TLS_connections
gptkbp:is_a downgrade attack
gptkbp:is_available_in 2015
gptkbp:is_evaluated_by legacy systems
gptkbp:is_supported_by updating server configurations
gptkbp:issues secure communications
gptkbp:isVulnerableTo secure communications protocols.
gptkbp:leads data interception
gptkbp:related_to FREAK attack
gptkbp:relatedTo POODLE attack
gptkbp:reportsTo researchers_at_the_University_of_Michigan
gptkbp:requires active network attacker
gptkbp:skills Diffie-Hellman key exchange
gptkbp:targets weak Diffie-Hellman parameters
gptkbp:threats privacy and security