Deploying a New Hash Algorithm
The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away from those now, it is clear that it will be necessary to do so in the not-too-distant future. This poses a number of challenges, especially for certificate-based protocols. We analyze a number of protocols, including S/MIME and TLS. All require protocol or implementation changes. We explain the necessary changes, show how the conversion can be done, and list what measures should be taken immediately.
- new-hash.pdf application/pdf 134 KB Download File
More About This Work
- Academic Units
- Computer Science
- Published Here
- June 25, 2010
2006 Network and Distributed System Security Symposium: February 2-3, 2006, San Diego, California: proceedings (Reston, Va.: Internet Society, 2006).