“Relax—it’s not true that researchers have broken the Diffie-Hellman key exchange protocol.

Earlier this year, a research paper presented a new attack against the Diffie-Hellman key exchange protocol. Among other things, the paper came with a reasonable explanation of how the NSA might be able to read a lot of the Internet’s VPN traffic. I wrote a blog about this in May.

Last month, the paper was presented at the ACM CCS 2015 conference and thus made the news again. While the research does have serious implications, it did not signal the end of the use of the Diffie-Protocol as some suggested.” – Martijn Grooten / ArsTechnica

http://arstechnica.com/security/2015/11/op-ed-how-did-they-break-diffie-hellman/