According to new research, attacks on the SHA-1 hashing algorithm just got a lot more dangerous with the discovery of a cheaper, more practical version of SHA-1 collision attacks. Hashing algorithms are used to compute the keys used in public key encryption which is essential to the security of nearly every web transaction.
Although the industry has been trying to move away from SHA-1 for years, Venafi has found more than 6 million SHA-1 certificates still in use on public facing websites.
Experts Comments
Dot Your Expert Comments
Only for registered and approved experts. Please register before providing comments. Register here
Linkedin Message
@Hari Nair, Director of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Quantum computing promises even more disruption in the future...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/sha-1-attacks-on-upswing-expert-comments
Facebook Message
@Hari Nair, Director of Product Management , provides expert commentary for "dot your expert comments" at @Information Security Buzz.
"Quantum computing promises even more disruption in the future...."
#infosec #cybersecurity #isdots
https://informationsecuritybuzz.com/expert-comments/sha-1-attacks-on-upswing-expert-comments