This article needs a technical review. How you can help.
Why Signature Algorithms Matter
The strength of the hash algorithm used in signing a digital certificate is a critical element of the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can create or obtain fraudulent certificates. As new attacks are found and improvements in available technology make attacks more feasible, the use of older algorithms is discouraged and support for them is eventually removed.
SHA-1
SHA-1 certificates will no longer be treated as secure by major browser manufacturers beginning in 2017.
MD5
Support for MD5 based signatures was removed in early 2012.
Learn More
- Mozilla Security Blog post on the deprecation of SHA-1
Document Tags and Contributors
Tags:
Contributors to this page:
grazies,
kcjoon,
andespa87,
jsx,
jswisher,
grozis28,
t9anef,
grifted,
cyfur,
chuggs10,
jaycarrigan1931,
HUNTEDBOY,
elho,
sandhiller58,
SphinxKnight,
elmaystro56,
DCS_princess,
wiml,
Qazal,
suncross,
jozefjuszkiewicz,
nickgibson215,
maichoibg,
kscarfone,
dwilestari555,
marumari,
teoli,
oRyzh,
Moelay,
maybe,
lilliandyer57,
keni1,
nasko83,
mohideen.azam,
01271425424,
evisu,
seahorse48,
dwulive,
wbamberg,
michaelweghorn,
mgoodwin
Last updated by:
grazies,