Computer Science, asked by Karmenmarina, 11 months ago

what are the main features of SHA-1, SHA-2 and SHA-3 in terms of hashing algorithms and input / key size features?

Answers

Answered by Anonymous
3
  • SHA-1 was deemed insecure because, due to both its size and construction, it was feasible to produce a collision.
  • “SHA-2 Transition.” It involved re-issuing thousands of existing certificates so that new files could be created and signed with SHA-2. It also involved major updates to the issuance software that publicly-trusted CAs operate (there are dozens of them). As expected, there were some hiccups.
  • The deadline for issuing new SSL certificates with SHA-1 hashes was December 31st, 2015. For the most part, the industry has stuck by that deadline. Since then, a few mistakes have been made, and a few special cases were granted.
Similar questions