filmov
tv
Why is SHA-2 safer than SHA-1 in SSL certificates (screencast) - Cryptography/SSL 101 #6
Показать описание
Here is a detailed walkthrough of why the strength of the hash function used to sign the certificates is very important and why SHA-1 is being phased out in favour of SHA-2.
We go through the end to end process of signing a certificate, then in reverse show what happens as the signatures are validated by the browser.
Then we discuss some ways in which a compromise of the hash functions can lead to dangerous scenarios on the internet.
Finally a brief overview of what people who are responsible for websites need to know and the urgency of making the changes.
If you're looking for a great text description of how the SSL chain works I would recommend this one.
We go through the end to end process of signing a certificate, then in reverse show what happens as the signatures are validated by the browser.
Then we discuss some ways in which a compromise of the hash functions can lead to dangerous scenarios on the internet.
Finally a brief overview of what people who are responsible for websites need to know and the urgency of making the changes.
If you're looking for a great text description of how the SSL chain works I would recommend this one.
Why is SHA-2 safer than SHA-1 in SSL certificates (screencast) - Cryptography/SSL 101 #6
How secure is 256 bit security?
SHA-1 VS SHA-2 VS SHA-256 - Difference between SHA-1 VS SHA-2 VS SHA-256
The unsolved math problem which could be worth a billion dollars.
SHA-256 | COMPLETE Step-By-Step Explanation (W/ Example)
Shame about SHA-2: Symantec flunks basic programming
SHA-256 Simplified: What Is It And Why It Is So Secure
Blake3 vs SHA-256 Speed Efficiency and Security
GTER 40: SHA-1, SHA-2 TLS Migrations and New Standards
What is SHA256?
4 Understanding SHA256 Hash
What is Hashing? (MD5, SHA1 & SHA256)
Hashing and Hash Cracking Explained Simply! (2021) | MD5, SHA1, and SHA256
How Does SHA256 Work?
Crytpocoins: SHA-256 vs Scrypt
BLAKE3 vs SHA-256
SHA-2
Secure Hash Algorithm
Hashing - what it is, how it's used and why it matters - with MD5 and SHA2-256 examples
SHA-2
Asymmetric Encryption - Simply explained
Security Snippets: MD5, SHA-1 and SHA-2
How to Upgrade Certification Authority to Use SHA2 - Step by Step
Investigating SHA256 in Bitcoin
Комментарии