Deploying a New Hash Algorithm

Bellovin, Steven Michael; Rescorla, Eric K.

The strength of hash functions such as MD5 and SHA-1 has been called into question as a result of recent discoveries. Regardless of whether or not it is necessary to move away from those now, it is clear that it will be necessary to do so in the not-too-distant future. This poses a number of challenges, especially for certificate-based protocols. We analyze a number of protocols, including S/MIME and TLS. All require protocol or implementation changes. We explain the necessary changes, show how the conversion can be done, and list what measures should be taken immediately.



More About This Work

Academic Units
Computer Science
Published Here
June 25, 2010


2006 Network and Distributed System Security Symposium: February 2-3, 2006, San Diego, California: proceedings (Reston, Va.: Internet Society, 2006).