1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

Do it now! From SHA-1 to SHA-2 in 8 steps

Discussion in 'Network World' started by RSS, Jun 9, 2016.

  1. RSS

    RSS New Member Member

    As deadlines go, Jan. 1, 2017, isn’t far away, yet many organizations still haven’t switched their digital certificates and signing infrastructure to use SHA-2, the set of cryptographic hash functions succeeding the weaker SHA-1 algorithm. SHA-1 deprecation must happen; otherwise, organizations will find their sites blocked by browsers and their devices unable to access HTTPS sites or run applications.

    All digital certificates -- to guarantee the website accepting payment card information is secure, software is authentic, and the message was sent by a person and not an impersonator -- are signed by a hashing algorithm. The most common is currently SHA-1, despite significant cryptographic weaknesses that render the certificates vulnerable to collision attacks.

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...
     

Share This Page