What worries me more is the fact that your SSL encryption is not secure, because you only use asymmetric 1024-bit encryption to protect your keys.
Adi Shamir (“S” in RSA) recommended switching to 2048-bit keys back in 2006, even the American Standards Institute (NIST) has achieved a minimum strength of 2048 bits since January 2011 (see NIST SP800-57 for minimum key values is 2048 bits for RSA and DH / el-gamal).
In short, first make sure that RSA encryption is strong enough as it is used to protect symmetric keys (AES / Camellia). Never rely on a key that is protected by a weaker key (this is like using a secure 256-bit WPA 2 random key at a wireless access point, and then trust in WPS, which will open in a few hours!)
Even if it's a test system, learn how to use cryptography the way you intend to move forward; do not compromise the strength of the certificate key (all CAs today must reject 1024 bit or CSR requests using MD5, if they are not used, create your own test certificates as if you were executing a real request and do not use key sizes by default).
It is difficult to compare strengths, both received cryptographic analysis (AES more publicly) and are sufficient to ensure data security.
At the risk of repeating itself, Id is more worried about the 1024 bits used to ensure key agreement.
Graham coles
source share