Broken Security: 5 Ways To Avoid The Coming Cryptopocalypse

Companies should survey their exposure, according to the security researchers. To prepare for an eventual crack of the encryption algorithm, use ECC certificates where possible. Businesses need to urge vendors to support TLS version 1.2 and ECC, the researchers said. They need to turn on support of the Elliptic Curve Ephemeral Diffie-Hellman algorithm that provides forward secrecy, a key-agreement protocol that can shield data from full disclosure if a private key is broken in the future.