what are the main features of SHA-1, SHA-2 and SHA-3 in terms of hashing algorithms and input / key size features?
Answers
Answered by
3
- SHA-1 was deemed insecure because, due to both its size and construction, it was feasible to produce a collision.
- “SHA-2 Transition.” It involved re-issuing thousands of existing certificates so that new files could be created and signed with SHA-2. It also involved major updates to the issuance software that publicly-trusted CAs operate (there are dozens of them). As expected, there were some hiccups.
- The deadline for issuing new SSL certificates with SHA-1 hashes was December 31st, 2015. For the most part, the industry has stuck by that deadline. Since then, a few mistakes have been made, and a few special cases were granted.
Similar questions