Microsoft Official blog announced that 2016 years later, the company's software will identify the use of the SHA-1 hash algorithm digital certificate is invalid. It also advises customers to stop using RC4 encryption algorithms in software and applications. SHA-1 and other hashing algorithms are vulnerable to collision attacks. Collisions occur when two different messages produce the same hash. The security of a hashing algorithm relies on each plaintext string or file to produce a unique hash.
Attackers can use collision attacks to falsify certificates to compromise system security. Last June, Microsoft security experts claimed that a malicious program flame attacker used a collision attack to forge a digital certificate for Microsoft's weak hash algorithm. As CPU and GPU computing power improves, SHA-1 will become increasingly vulnerable to collision attacks, and Microsoft advises users to start using SHA-2.
This article URL address: http://www.bianceng.cn/Programming/sjjg/201410/45350.htm