Insecure Cipher Suite
- IANA name:
- Hex code:
- 0x00, 0x0C
- TLS Version(s):
- TLS1.0, TLS1.1
- Transport Layer Security (TLS)
- Key Exchange:
- Diffie-Hellman (DH)
- Digital Signature Standard (DSS)
- Data Encryption Standard with 56bit key in Cipher Block Chaining mode (DES CBC)
- Secure Hash Algorithm 1 (SHA)
- Included in RFC:
Diffie-Hellman key exchanges not using ephemeral keys do not support Perfect Forward Secrecy (PFS) which is recommended, so attackers cannot decrypt the whole communication stream.
The CBC mode is vulnerable to plain-text attacks with TLS 1.0, SSL 3.0 and lower. However a real fix is implemented with TLS 1.2 in which the GCM mode was introduced and which is not vulnerable to the BEAST attack. GCM should be preferred over CBC (cf. BEAST).
DES is considered weak, primarily due to its short key-lengths of 40 or 65-Bit. Furthermore, it has been withdrawn as a standard by the National Institute of Standards and Technology in 2005.
The Secure Hash Algorithm 1 has been proven to be insecure as of 2017 (cf. shattered.io).