All Algorithms

DH-1024

Quantum Unsafe

Key Exchange algorithm

This algorithm will be broken by a cryptographically relevant quantum computer. Migration is recommended.

Algorithm Details

Category

Key Exchange

Quantum Safety

Quantum Unsafe

Key Lengths (bits)

1024

Deprecation Date

2013

Known Vulnerabilities

  • Shor's algorithm (DLP)
  • Classical precomputation (Logjam)

Migration Recommendation

Recommended post-quantum replacement:

Migrate to ML-KEM-512

Notes

Deprecated. Vulnerable to Logjam attack classically and trivially broken by a CRQC.

Discover which algorithms your organization is using.

Run Free Assessment
NetflixOracleFigmaCoinbaseDellServiceNowAppleDeloitteNikeAWSJPMorgan ChaseT-MobileAtlassianBoschStripeL'OrealDatadogMicrosoftPalantirHPRobinhoodEYSonyCanvaVisaAutoCADDiscordBellAdobeCharles SchwabE*TRADENVIDIAGoogleJohnson & JohnsonFidelityClaudeMastercardIntuitBoeingAT&TShopifyPwCOpenAIKPMGIBMDatabricksSalesforceGitHubAmerican ExpressWorkday