Skip to content
arrow_back
search
ISM-0472 policy ASD Information Security Manual (ISM)

Using Proper Modulus Size for Diffie-Hellman Keys

Ensure Diffie-Hellman encryption uses at least a 2048 bits modulus for secure key agreements.

record_voice_over

Plain language

When using Diffie-Hellman, a tool that helps computers agree on secret information to stay safe online, you need to make sure it uses a big enough key, at least 2048 bits, to keep communications secure. If the key is too small, hackers could potentially crack the code, leading to stolen data and compromised security.

Framework

ASD Information Security Manual (ISM)

Control effect

Preventative

Classifications

NC, OS, P

ISM last updated

Nov 2024

Control Stack last updated

19 Mar 2026

E8 maturity levels

N/A

Official control statement

When using DH for agreeing on encryption session keys, a modulus of at least 2048 bits is used, preferably 3072 bits.
policy ASD Information Security Manual (ISM) ISM-0472
priority_high

Why it matters

Using DH with a weak modulus increases the chance an attacker can derive session keys and decrypt or tamper with traffic, exposing sensitive data.

settings

Operational notes

Regularly verify DH parameters use ≥2048-bit modulus (prefer 3072-bit). Use scanners/policy checks to detect and remediate weaker cipher suite settings.

Mapping detail

Mapping

Direction

Controls