SHA-1 (deprecated)

From wikieduonline
Revision as of 05:38, 18 August 2021 by Welcome (talk | contribs) (→‎See also)
Jump to navigation Jump to search

Attacks

Certificates are at special risk to the aforementioned SHA1 collision vulnerability as an attacker has effectively unlimited time in which to craft a collision that yields them a valid certificate, far more than the relatively brief LoginGraceTime window that they have to forge a host key signature.

See also

Advertising: