Differences

This shows you the differences between the selected revisions of the page.

2023-02-13 2023-02-13
6.0 Support for NTRU Prime post-quantum key exchange + Support for more forms of Diffie-Hellman key exchange: new larger integer groups (such as group16 and group18), and support for using those and ECDH with GSSAPI (martin) beta (martin)
Line 23: Line 23:
WinSCP currently supports the following key exchange methods: WinSCP currently supports the following key exchange methods:
-  * //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks.+  * //NTRU Prime / Curve25519 hybrid//: Streamlined NTRU Prime is a lattice-based algorithm intended to resist quantum attacks. In this key exchange method, it is run in parallel with a conventional Curve25519-based method (one of those included in //ECDH//, in such a way that it should be no less secure than that commonly-used method, and hopefully also resistant to a new class of attacks. &beta_feature
  * //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:   * //ECDH//: elliptic curve Diffie-Hellman key exchange, with a variety of standard curves and hash algorithms. \\ The original form of Diffie-Hellman key exchange, with a variety of well-known groups and hashes:
-    * //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function. +    * //Group 18//, a well-known 8192-bit group, used with the SHA-512 hash function. &beta_feature 
-    * //Group 17//, a well-known 6144-bit group, used with the %%SHA-512%% hash function. +    * //Group 17//, a well-known 6144-bit group, used with the %%SHA-512%% hash function. &beta_feature 
-    * //Group 16//, a well-known 4096-bit group, used with the %%SHA-512%% hash function. +    * //Group 16//, a well-known 4096-bit group, used with the %%SHA-512%% hash function. &beta_feature 
-    * //Group 15//, a well-known 3072-bit group, used with the %%SHA-512%% hash function.+    * //Group 15//, a well-known 3072-bit group, used with the %%SHA-512%% hash function. &beta_feature
    * //Group 14//: a well-known 2048-bit group, used with the SHA-256 hash function or, if the server doesn't support that, SHA-1.     * //Group 14//: a well-known 2048-bit group, used with the SHA-256 hash function or, if the server doesn't support that, SHA-1.
    * //Group 1// : a well-known 1024-bit group, used with the %%SHA-1%% hash function. Neither we nor current SSH standards recommend using this method any longer, and it's not used by default in new installations; however, it may be the only method supported by very old server software.     * //Group 1// : a well-known 1024-bit group, used with the %%SHA-1%% hash function. Neither we nor current SSH standards recommend using this method any longer, and it's not used by default in new installations; however, it may be the only method supported by very old server software.

Last modified: by martin