Recommendation on the use of Hash Algorithms

Hash algorithms have been gaining intense attention in the cryptography and information security community due to a number of attacks that have been discovered on these algorithms in recent years.

In January 2009, commercial CAs were forced to stop issuing MD5–based certificates due to these attacks. We urge customers to be very cautious when deploying hash algorithms.

Last modified: 2013-12-21

comments powered by Disqus