{"json_modified": "2015-10-02T08:10:12.663548", "slug": "Security/Weak_Signature_Algorithm", "tags": [], "locale": "ar", "title": "Weak Signature Algorithm", "translations": [{"title": "Weak Signature Algorithm", "url": "/en-US/docs/Web/Security/Weak_Signature_Algorithm", "tags": ["Guide", "Security", "guide", "Cryptography"], "summary": "The strength of the hash algorithm used in signing a digital certificate is a critical element of the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can create or obtain fraudulent certificates. As new attacks are found and improvements in available technology make attacks more feasible, the use of older algorithms is discouraged and support for them is eventually removed.", "localization_tags": [], "locale": "en-US", "last_edit": "2015-09-21T12:36:14", "review_tags": ["technical", "editorial"]}, {"title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/Weak_Signature_Algorithm", "tags": ["\u5b89\u5168"], "summary": "\u5728\u7b7e\u7f72\u6570\u5b57\u8bc1\u4e66\u65f6\uff0c\u54c8\u5e0c\u7b97\u6cd5\u7684\u5b8c\u6574\u6027\u662f\u51b3\u5b9a\u8bc1\u4e66\u5b89\u5168\u6027\u7684\u5173\u952e\u56e0\u7d20\u3002\u54c8\u5e0c\u7b97\u6cd5\u7684\u5f31\u70b9\u53ef\u80fd\u5bfc\u81f4\u653b\u51fb\u8005\u5728\u67d0\u4e9b\u60c5\u51b5\u4e0b\u80fd\u591f\u83b7\u5f97\u4f2a\u9020\u7684\u8bc1\u4e66\u3002\u7531\u4e8e\u6280\u672f\u7684\u5347\u7ea7\u548c\u5df2\u77e5\u7684\u65b0\u578b\u653b\u51fb\uff0c\u6b64\u7c7b\u653b\u51fb\u7684\u53ef\u884c\u6027\u5df2\u7ecf\u5927\u4e3a\u63d0\u5347\u3002\u56e0\u6b64\uff0c\u4e0d\u63a8\u8350\u4f7f\u7528\u65e7\u7b97\u6cd5\uff0c\u5bf9\u4e8e\u65e7\u7b97\u6cd5\u7684\u652f\u6301\u6700\u7ec8\u4e5f\u4f1a\u505c\u6b62\u3002", "localization_tags": [], "locale": "zh-CN", "last_edit": "2015-07-09T23:10:23", "review_tags": []}, {"title": "\u0421\u043b\u0430\u0431\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u043f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\u0426\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 \u0445\u0435\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u0432 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u0438\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0430\u0436\u043d\u044b\u043c \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u043c \u0432 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430. \u0421\u043b\u0430\u0431\u044b\u0435 \u043c\u0435\u0441\u0442\u0430 \u0445\u044d\u0448-\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u043c, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b. \u0421 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435\u043c \u043d\u043e\u0432\u044b\u0445 \u0432\u0438\u0434\u043e\u0432 \u0430\u0442\u0430\u043a \u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0447\u0442\u043e \u043e\u0431\u043b\u0435\u0433\u0447\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438, \u0441\u0442\u0430\u0440\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u043d\u0435\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u043c\u0438 \u0438 \u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0441\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f.", "localization_tags": [], "locale": "ru", "last_edit": "2015-05-28T03:06:07", "review_tags": []}, {"title": "Algoritmo de Assinatura Fraco", "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "summary": "A integridade do algoritmo de hash usado na assinatura de um certificado \u00e9 um elemento cr\u00edtico para a seguran\u00e7a do certificado. Fraquezas em algoritmos de hash podem levar a situa\u00e7\u00f5es em que os atacantes podem obter certificados fraudulentos. \u00c0 medida que novos ataques s\u00e3o encontrados e melhorias nas tecnologias dispon\u00edveis tornam ataques mais vi\u00e1veis, o uso de algoritmos antigos \u00e9 desencorajado e o suporte eventualmente removido.", "localization_tags": [], "locale": "pt-BR", "last_edit": "2015-01-16T09:16:05", "review_tags": []}, {"title": "Weak Signature Algorithmus", "url": "/de/docs/Sicherheit/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "de", "last_edit": "2015-07-25T05:52:54", "review_tags": []}, {"title": "Algorithme de signature faible", "url": "/fr/docs/S%C3%A9curit%C3%A9/Algorithme_Signature_Faible", "tags": ["Guide", "Security"], "summary": "L'int\u00e9grit\u00e9 d'un algorithme de hachage utilis\u00e9 pour signer un certificat est un \u00e9l\u00e9ment critique de sa s\u00e9curit\u00e9. Les faiblesses des algorithmes de hachage peuvent conduire \u00e0 des situations dans lesquelles les attaquants peuvent obtenir frauduleusement des certificats. Comme de nouvelles attaques apparaissent r\u00e9guli\u00e8rement et que les am\u00e9liorations technologiques les rendent plus faciles \u00e0 mettre en oeuvre, l'utilisation d'algorithmes d\u00e9pass\u00e9s n'est pas conseill\u00e9e et leur support, \u00e9ventuellement arr\u00eat\u00e9.", "localization_tags": [], "locale": "fr", "last_edit": "2015-06-03T11:17:35", "review_tags": []}, {"title": "Algoritmo di firma debole", "url": "/it/docs/Security/Firma_Algoritmo_Debole", "tags": ["Guida", "Sicurezza", "Crittografia"], "summary": "L'integrit\u00e0 del algoritmo hash utilizzato nella firma di un certificato digitale \u00e8 un elemento critico per la sicurezza del certificato stesso. Debolezze negli algoritmi hash possono condurre a situazioni in cui degli attaccanti possono creare od ottenere certificati fraudolenti. A mano a mano che nuovi attacchi vengono scoperti e gli sviluppi delle tecnologie disponibili rendono gli attacchi maggiormente fattibili, l'utilizzo degli algoritmi pi\u00f9 vecchi viene scoraggiato e il relativo supporto alla fine viene rimosso.", "localization_tags": [], "locale": "it", "last_edit": "2015-06-25T23:32:09", "review_tags": []}, {"title": "Algoritmo de Firma D\u00e9bil", "url": "/es/docs/Seguridad/Weak_Signature_Algorithm", "tags": ["Espa\u00f1ol"], "summary": "", "localization_tags": ["inprogress"], "locale": "es", "last_edit": "2015-09-24T00:37:07", "review_tags": ["technical", "editorial"]}, {"title": "\u5f31\u7c3d\u7ae0\u6f14\u7b97\u6cd5", "url": "/zh-TW/docs/Security/%E5%BC%B1%E7%B0%BD%E7%AB%A0%E6%BC%94%E7%AE%97%E6%B3%95", "tags": [], "summary": "\u5728\u7c3d\u7f72\u6191\u8b49\u6642\uff0c\u96dc\u6e4a\u6f14\u7b97\u6cd5\u7684\u5b8c\u6574\u6027\u662f\u975e\u5e38\u91cd\u8981\u7684\u4e00\u74b0\u3002\u96dc\u6e4a\u6f14\u7b97\u6cd5\u7684\u6f0f\u6d1e\u53ef\u80fd\u5c0e\u81f4\u653b\u64ca\u8005\u7372\u53d6\u5047\u9020\u7684\u6191\u8b49\u3002\u96a8\u8457\u79d1\u6280\u767c\u5c55\u51fa\u73fe\u66f4\u591a\u53ef\u884c\u7684\u653b\u64ca\u65b0\u624b\u6cd5\uff0c\u4e26\u4e0d\u5efa\u8b70\u7e7c\u7e8c\u4f7f\u7528\u820a\u7684\u6f14\u7b97\u6cd5\uff0c\u4e14\u9019\u4e9b\u6f14\u7b97\u6cd5\u6700\u7d42\u8a72\u88ab\u79fb\u9664\u3002", "localization_tags": [], "locale": "zh-TW", "last_edit": "2015-09-17T23:36:44", "review_tags": ["technical", "editorial"]}, {"title": "Algoritma Tanda Tangan Lemah", "url": "/id/docs/Security/Algoritma_Tanda_Tangan_Lemah", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "id", "last_edit": "2015-09-09T01:28:58", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/nl/docs/Security/Weak_Signature_Algorithm", "tags": ["Beveiliging", "md5", "sha-1", "certificaten", "hashing-algoritme", "algoritme", "cryptografie"], "summary": "De integriteit of deugdzaamheid van een hashing-algoritme dat gebruikt wordt bij het ondertekenen van digitale certificaten is een kritiek element in de beveiliging ervan.
Zwakke punten in hashing-algoritmes vergemakkelijkt aanvallen bedoeld om frauduleuze certificaten te bemachtigen.", "localization_tags": [], "locale": "nl", "last_edit": "2015-03-15T16:57:15", "review_tags": ["technical"]}, {"title": "Slab\u00fd kryptografick\u00fd algoritmus pou\u017e\u00edvan\u00fd p\u0159i vytv\u00e1\u0159en\u00ed elektronick\u00e9ho podpisu", "url": "/cs/docs/Security/Weak_Signature_Algorithm", "tags": ["Digit\u00e1ln\u00ed certifik\u00e1t", "Kryptografie", "Bezpe\u010dnost", "\u0160ifrov\u00e1n\u00ed"], "summary": "Odolnost a s\u00edla hash algoritmu pou\u017eit\u00e9ho p\u0159i podpisu certifik\u00e1tu je kritick\u00fdm prvkem bezpe\u010dnosti tohoto certifik\u00e1tu. Nedostatky v \u0161ifrovac\u00edm (podpisov\u00e9m) hash algoritmu mohou v\u00e9st k situac\u00edm, kdy \u00fato\u010dn\u00edci mohou vytvo\u0159it nebo z\u00edskat fale\u0161n\u00e9 certifik\u00e1ty. Nav\u00edc vzhledem k v\u00fdvoji \u00fatok\u016f a tak\u00e9 technologie se kryptografick\u00e9 algoritmy st\u00e1vaj\u00ed zraniteln\u011bj\u0161\u00ed. Odrazuje se proto od jejich pou\u017e\u00edv\u00e1n\u00ed a tak\u00e9 kon\u010d\u00ed jejich vyd\u00e1v\u00e1n\u00ed a p\u0159\u00edpadn\u00e1 podpora.", "localization_tags": [], "locale": "cs", "last_edit": "2015-09-28T05:14:41", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/th/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "th", "last_edit": "2015-04-11T12:39:37", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/ko/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\uc778\uc99d\uc11c\ub97c \uc11c\uba85\ud558\ub294\ub370 \uc0ac\uc6a9\ub418\ub294 \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ubb34\uacb0\uc131\uc740 \uc778\uc99d\uc11c\uc758 \ubcf4\uc548\uc5d0 \uc911\uc694\ud55c \uc694\uc18c\uc785\ub2c8\ub2e4. \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ucde8\uc57d\uc131\uc740 \uacf5\uaca9\uc790\uac00 \uc704\uc870 \uc778\uc99d\uc11c\ub97c \ub9cc\ub4dc\ub294 \uc0c1\ud669\uc744 \uc77c\uc73c\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uba74 \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \uae30\ubc95\uc774 \ubc1c\uacac\ub418\uac70\ub098 \uae30\uc874\uc758 \uacf5\uaca9 \uae30\uc220\uc774 \uac1c\uc120\ub420 \uc218\ub85d \ub354\uc6b1 \ub354 \uacf5\uaca9 \ubc1b\uae30 \uc26c\uc6cc\uc9d1\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uae30\ub97c \uad8c\uc7a5\ud558\uba70 \uacb0\uad6d \uc774\uc5d0 \ub300\ud55c \uc9c0\uc6d0\uc740 \uc911\ub2e8\ub420 \uac83\uc785\ub2c8\ub2e4.", "localization_tags": ["inprogress"], "locale": "ko", "last_edit": "2015-04-02T23:48:07", "review_tags": []}, {"title": "Zay\u0131f \u0130mza Algoritmas\u0131", "url": "/tr/docs/Security/Zat%C4%B1f_%C4%B0mza_Algoritmas%C4%B1", "tags": ["K\u0131lavuz G\u00fcvenlik Algoritmalar"], "summary": "Sertifika imzalamada kullan\u0131lan imza algoritmalar\u0131 sertifikalar\u0131n g\u00fcvenli\u011finin kritik bir eleman\u0131d\u0131r. \u0130mza algoritmalar\u0131ndak zay\u0131fl\u0131klar sald\u0131rganlar\u0131 sahte sertifikalar \u00fcretmelerine yol a\u00e7abilir. Yeni atak t\u00fcrlerini bulunmas\u0131 ve teknolojideki geli\u015fmeler imzalara kar\u015f\u0131 yap\u0131lan sald\u0131r\u0131larda ba\u015far\u0131l\u0131 olmay\u0131 daha fazla m\u00fcmk\u00fcn hale getirmi\u015ftir. Bu sebeplerden eski algoritmalar\u0131n kullan\u0131m\u0131ndan vazge\u00e7ilmekte ve nihayetinde destek kald\u0131r\u0131lmaktad\u0131r.", "localization_tags": [], "locale": "tr", "last_edit": "2015-05-15T04:30:15", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/pl/docs/Web/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "pl", "last_edit": "2015-08-08T01:52:04", "review_tags": []}], "modified": "2015-10-02T08:10:11", "label": "Weak Signature Algorithm", "localization_tags": ["inprogress"], "url": "/ar/docs/Security/Weak_Signature_Algorithm", "last_edit": "2015-10-02T08:10:11", "summary": "The integrity of the hash algorithm used in signing a certificate is a critical element in the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can obtain fraudulent certificates. As new attacks are found and improvements in available technology make attacks more feasible, the use of older algorithms is discouraged and support eventually removed.", "sections": [{"id": "Why_Signature_Algorithms_Matter", "title": "Why Signature Algorithms Matter"}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}], "id": 144041, "review_tags": ["technical", "editorial"]}