PKI Blog

SHA-3 Announcement

Posted by Wayne Harris on Oct 4, 2012 8:16:30 AM

As many know, the cryptographic hash function known as Secure Hash Algorithm 1 (SHA-1) has been deemed weak by NIST, and is no longer recommended. The NSA addressed the weaknesses in SHA-1 by publishing the SHA-2 hash function standard back in 2001. SHA-2 builds on SHA-1 by using similar algorithms with larger block and state sizes.

Read More

Topics: Keccak, Public Key Infrastructure, Industry Trends, NIST, Microsoft Public Key Infrastructure, PKI, Secure Hash Algorithm, Blog, SHA-1, SHA-2, SHA-3, NSA

Time's Up for SHA-1, CSS' Suggested Migration Path

Posted by Wayne Harris on Apr 18, 2011 5:00:16 AM

SHA-1 is a widely adopted hash algorithm that can no longer be considered trustworthy. Current PKI design analysts must weigh the benefits of implementing SHA-2 verses the compatibility problems associated with its adoption. This design decision is driven by the recent understanding that SHA-1 hashes are cryptographically weak and the opportunity for malicious manipulation of resulting hash values are much easier than originally anticipated. This is a serious problem if an authentic digital signature on contract for $100, cannot be distinguished from a fraudulent digital signature on a contract worth $100,000.

Read More

Topics: Microsoft Security Partner, digital pki, Public Key Infrastructure, Microsoft Public Key Infrastructure, Secure Hash Algorithm, Microsoft PKI, Blog, SHA-1, SHA-2, SHA-3, Got PKI?

Posts by Topic

see all

Want to Learn more about CSS?