{"json_modified": "2016-04-24T05:09:59.855050", "uuid": "f99f7088-7a22-44f5-bf4d-bba88235fe7f", "title": "Weak Signature Algorithm", "url": "/en-US/docs/Web/Security/Weak_Signature_Algorithm", "tags": ["Guide", "Security", "Cryptography"], "translations": [{"uuid": "cfb77325-1746-480b-96b1-d8d14fa4e699", "title": "Weak Signature Algorithm", "url": "/ar/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "ar", "last_edit": "2015-10-02T08:10:22", "review_tags": []}, {"uuid": "2d9f41cf-928d-427a-a3bc-e4ef47570f44", "title": "Slab\u00fd kryptografick\u00fd algoritmus pou\u017e\u00edvan\u00fd p\u0159i vytv\u00e1\u0159en\u00ed elektronick\u00e9ho podpisu", "url": "/cs/docs/Security/Weak_Signature_Algorithm", "tags": ["Digit\u00e1ln\u00ed certifik\u00e1t", "Kryptografie", "Bezpe\u010dnost", "\u0160ifrov\u00e1n\u00ed"], "summary": "Odolnost a s\u00edla hash algoritmu pou\u017eit\u00e9ho p\u0159i podpisu certifik\u00e1tu je kritick\u00fdm prvkem bezpe\u010dnosti tohoto certifik\u00e1tu. Nedostatky v \u0161ifrovac\u00edm (podpisov\u00e9m) hash algoritmu mohou v\u00e9st k situac\u00edm, kdy \u00fato\u010dn\u00edci mohou vytvo\u0159it nebo z\u00edskat fale\u0161n\u00e9 certifik\u00e1ty. Nav\u00edc vzhledem k v\u00fdvoji \u00fatok\u016f a tak\u00e9 technologie se kryptografick\u00e9 algoritmy st\u00e1vaj\u00ed zraniteln\u011bj\u0161\u00ed. Odrazuje se proto od jejich pou\u017e\u00edv\u00e1n\u00ed a tak\u00e9 kon\u010d\u00ed jejich vyd\u00e1v\u00e1n\u00ed a p\u0159\u00edpadn\u00e1 podpora.", "localization_tags": [], "locale": "cs", "last_edit": "2015-09-28T05:14:41", "review_tags": []}, {"uuid": "a1801782-33e7-4dd1-b8af-fcf4c5e6ae35", "title": "Weak Signature Algorithmus", "url": "/de/docs/Sicherheit/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "de", "last_edit": "2015-07-25T05:52:54", "review_tags": []}, {"uuid": "0f1a9457-1b7e-4a3d-a6d5-757514bea069", "title": "Algoritmo de Firma D\u00e9bil", "url": "/es/docs/Seguridad/Weak_Signature_Algorithm", "tags": ["Espa\u00f1ol"], "summary": "", "localization_tags": ["inprogress"], "locale": "es", "last_edit": "2015-09-24T00:37:07", "review_tags": ["technical", "editorial"]}, {"uuid": "f2692ab5-13dc-4bb1-870d-5dc2edb9659e", "title": "Algorithme de signature faible", "url": "/fr/docs/S%C3%A9curit%C3%A9/Algorithme_Signature_Faible", "tags": ["Guide", "Security"], "summary": "L'int\u00e9grit\u00e9 d'un algorithme de hachage utilis\u00e9 pour signer un certificat est un \u00e9l\u00e9ment critique de sa s\u00e9curit\u00e9. Les faiblesses des algorithmes de hachage peuvent conduire \u00e0 des situations dans lesquelles les attaquants peuvent obtenir frauduleusement des certificats. Comme de nouvelles attaques apparaissent r\u00e9guli\u00e8rement et que les am\u00e9liorations technologiques les rendent plus faciles \u00e0 mettre en oeuvre, l'utilisation d'algorithmes d\u00e9pass\u00e9s n'est pas conseill\u00e9e et leur support, \u00e9ventuellement arr\u00eat\u00e9.", "localization_tags": [], "locale": "fr", "last_edit": "2015-06-03T11:17:35", "review_tags": []}, {"uuid": "b85baecb-36d3-443a-bd4c-9cb560a74385", "title": "Algoritma Tanda Tangan Lemah", "url": "/id/docs/Security/Algoritma_Tanda_Tangan_Lemah", "tags": [], "summary": "Integritas algoritma hash yang digunakan dalam menandatangani sertifikat merupakan elemen penting dalam keamanan sertifikat. Kelemahan dalam algoritma hash dapat menyebabkan situasi di mana penyerang dapat memperoleh sertifikat palsu. Sebagaimana\u00a0ditemukan serangan baru dan perbaikan dalam teknologi yang tersedia membuat serangan lebih mungkin dilakukan, penggunaan algoritma lama dikurangi dan dukungan akhirnya dihapus.", "localization_tags": [], "locale": "id", "last_edit": "2015-10-22T11:23:13", "review_tags": []}, {"uuid": "550f27dc-ffc1-4401-a41c-24a96aefeeb3", "title": "Algoritmo di firma debole", "url": "/it/docs/Security/Firma_Algoritmo_Debole", "tags": ["Guida", "Sicurezza", "Crittografia"], "summary": "L'integrit\u00e0 del algoritmo hash utilizzato nella firma di un certificato digitale \u00e8 un elemento critico per la sicurezza del certificato stesso. Debolezze negli algoritmi hash possono condurre a situazioni in cui degli attaccanti possono creare od ottenere certificati fraudolenti. A mano a mano che nuovi attacchi vengono scoperti e gli sviluppi delle tecnologie disponibili rendono gli attacchi maggiormente fattibili, l'utilizzo degli algoritmi pi\u00f9 vecchi viene scoraggiato e il relativo supporto alla fine viene rimosso.", "localization_tags": [], "locale": "it", "last_edit": "2015-06-25T23:32:09", "review_tags": []}, {"uuid": "353439a2-48d2-4770-a81a-4db34301d6dc", "title": "\u5f37\u5ea6\u306e\u5f31\u3044\u7f72\u540d\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0", "url": "/ja/docs/Web/Security/Weak_Signature_Algorithm", "tags": ["Guide", "Security", "Web", "Cryptography"], "summary": "\u30c7\u30a3\u30b8\u30bf\u30eb\u8a3c\u660e\u66f8 \u306e \u7f72\u540d \u306b\u7528\u3044\u3089\u308c\u308b\u7f72\u540d\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u5f37\u5ea6\u306f\u3001\u8a3c\u660e\u66f8\u306e\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u306b\u304a\u3044\u3066\u4e2d\u6838\u3092\u62c5\u3046\u8981\u7d20\u3067\u3059\u3002\u7f72\u540d\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u306e\u5f37\u5ea6\u304c\u5f31\u3044\u3068\u3001\u653b\u6483\u8005\u304c\u507d\u306e\u8a3c\u660e\u66f8\u3092\u4f5c\u6210\u30fb\u53d6\u5f97\u3067\u304d\u3066\u3057\u307e\u3046\u53ef\u80fd\u6027\u304c\u751f\u3058\u307e\u3059\u3002\u653b\u6483\u8005\u306e\u8996\u70b9\u304b\u3089\u307f\u308b\u3068\u3001\u65b0\u3057\u3044\u653b\u6483\u624b\u6cd5\u306e\u767a\u898b\u3084\u5229\u7528\u53ef\u80fd\u306a\u6280\u8853\u306e\u9032\u6b69\u306b\u3088\u308a\u3001\u5b9f\u969b\u306b\u653b\u6483\u3092\u5b9f\u884c\u3067\u304d\u308b\u78ba\u7387\u306f\u9ad8\u307e\u3063\u3066\u3044\u307e\u3059\u3002\u3057\u305f\u304c\u3063\u3066\u3001\u53e4\u3044\u30a2\u30eb\u30b4\u30ea\u30ba\u30e0\u3092\u5229\u7528\u3059\u308b\u3053\u3068\u306f\u63a8\u5968\u3055\u308c\u306a\u304f\u306a\u308a\u3001\u6700\u7d42\u7684\u306b\u306f\u524a\u9664\u3055\u308c\u308b\u3053\u3068\u306b\u306a\u308a\u307e\u3059\u3002", "localization_tags": [], "locale": "ja", "last_edit": "2016-02-16T00:30:33", "review_tags": []}, {"uuid": "884979e4-bad1-4818-8f26-a3f32e8e7f30", "title": "Weak Signature Algorithm", "url": "/ko/docs/Security/Weak_Signature_Algorithm", "tags": ["\uc554\ud638", "\ubcf4\uc548"], "summary": "\uc778\uc99d\uc11c\ub97c \uc11c\uba85\ud558\ub294\ub370 \uc0ac\uc6a9\ub418\ub294 \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ubb34\uacb0\uc131\uc740 \uc778\uc99d\uc11c\uc758 \ubcf4\uc548\uc5d0 \uc911\uc694\ud55c \uc694\uc18c\uc785\ub2c8\ub2e4. \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ucde8\uc57d\uc131\uc740 \uacf5\uaca9\uc790\uac00 \uc704\uc870 \uc778\uc99d\uc11c\ub97c \ub9cc\ub4dc\ub294 \uc0c1\ud669\uc744 \uc77c\uc73c\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uba74 \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \uae30\ubc95\uc774 \ubc1c\uacac\ub418\uac70\ub098 \uae30\uc874\uc758 \uacf5\uaca9 \uae30\uc220\uc774 \uac1c\uc120\ub420 \uc218\ub85d \ub354\uc6b1 \ub354 \uacf5\uaca9 \ubc1b\uae30 \uc26c\uc6cc\uc9d1\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uae30\ub97c \uad8c\uc7a5\ud558\uba70 \uacb0\uad6d \uc774\uc5d0 \ub300\ud55c \uc9c0\uc6d0\uc740 \uc911\ub2e8\ub420 \uac83\uc785\ub2c8\ub2e4.", "localization_tags": ["inprogress"], "locale": "ko", "last_edit": "2015-10-28T22:18:58", "review_tags": []}, {"uuid": "bbbd8755-7f3b-42e4-a94a-8138eb8c7c82", "title": "Weak Signature Algorithm", "url": "/nl/docs/Security/Weak_Signature_Algorithm", "tags": ["Beveiliging", "md5", "sha-1", "certificaten", "hashing-algoritme", "algoritme", "cryptografie"], "summary": "De integriteit of deugdzaamheid van een hashing-algoritme dat gebruikt wordt bij het ondertekenen van digitale certificaten is een kritiek element in de beveiliging ervan.
Zwakke punten in hashing-algoritmes vergemakkelijkt aanvallen bedoeld om frauduleuze certificaten te bemachtigen.", "localization_tags": [], "locale": "nl", "last_edit": "2015-03-15T16:57:15", "review_tags": ["technical"]}, {"uuid": "b66293e0-ce46-4d87-9d65-095d74af00a4", "title": "Weak Signature Algorithm", "url": "/pl/docs/Web/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "pl", "last_edit": "2015-08-08T01:52:04", "review_tags": []}, {"uuid": "bd18baa5-7a18-4177-acda-209a3c4719d4", "title": "Algoritmo de Assinatura Fraco", "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "summary": "A integridade do algoritmo de hash usado na assinatura de um certificado \u00e9 um elemento cr\u00edtico para a seguran\u00e7a do certificado. Fraquezas em algoritmos de hash podem levar a situa\u00e7\u00f5es em que os atacantes podem obter certificados fraudulentos. \u00c0 medida que novos ataques s\u00e3o encontrados e melhorias nas tecnologias dispon\u00edveis tornam ataques mais vi\u00e1veis, o uso de algoritmos antigos \u00e9 desencorajado e o suporte eventualmente removido.", "localization_tags": [], "locale": "pt-BR", "last_edit": "2015-01-16T09:16:05", "review_tags": []}, {"uuid": "51cc79de-1db2-4cd3-b691-d6d3edab3fff", "title": "\u0421\u043b\u0430\u0431\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u043f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\u0426\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 \u0445\u0435\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u0432 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u0438\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0430\u0436\u043d\u044b\u043c \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u043c \u0432 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430. \u0421\u043b\u0430\u0431\u044b\u0435 \u043c\u0435\u0441\u0442\u0430 \u0445\u044d\u0448-\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u043c, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b. \u0421 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435\u043c \u043d\u043e\u0432\u044b\u0445 \u0432\u0438\u0434\u043e\u0432 \u0430\u0442\u0430\u043a \u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0447\u0442\u043e \u043e\u0431\u043b\u0435\u0433\u0447\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438, \u0441\u0442\u0430\u0440\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u043d\u0435\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u043c\u0438 \u0438 \u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0441\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f.", "localization_tags": [], "locale": "ru", "last_edit": "2015-05-28T03:06:07", "review_tags": []}, {"uuid": "59ed5c11-df7e-4b4b-994a-b40015d42a15", "title": "Weak Signature Algorithm", "url": "/th/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "th", "last_edit": "2015-04-11T12:39:37", "review_tags": []}, {"uuid": "14c38672-8b12-4f21-9433-d8ca3d016a96", "title": "Zay\u0131f \u0130mza Algoritmas\u0131", "url": "/tr/docs/Security/Zat%C4%B1f_%C4%B0mza_Algoritmas%C4%B1", "tags": ["K\u0131lavuz G\u00fcvenlik Algoritmalar"], "summary": "Sertifika imzalamada kullan\u0131lan imza algoritmalar\u0131 sertifikalar\u0131n g\u00fcvenli\u011finin kritik bir eleman\u0131d\u0131r. \u0130mza algoritmalar\u0131ndak zay\u0131fl\u0131klar sald\u0131rganlar\u0131 sahte sertifikalar \u00fcretmelerine yol a\u00e7abilir. Yeni atak t\u00fcrlerini bulunmas\u0131 ve teknolojideki geli\u015fmeler imzalara kar\u015f\u0131 yap\u0131lan sald\u0131r\u0131larda ba\u015far\u0131l\u0131 olmay\u0131 daha fazla m\u00fcmk\u00fcn hale getirmi\u015ftir. Bu sebeplerden eski algoritmalar\u0131n kullan\u0131m\u0131ndan vazge\u00e7ilmekte ve nihayetinde destek kald\u0131r\u0131lmaktad\u0131r.", "localization_tags": [], "locale": "tr", "last_edit": "2015-05-15T04:30:15", "review_tags": []}, {"uuid": "9018eedb-e85c-44dc-8a23-3151c0644e4f", "title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/Weak_Signature_Algorithm", "tags": ["\u5b89\u5168"], "summary": "\u5728\u7b7e\u7f72\u6570\u5b57\u8bc1\u4e66\u65f6\uff0c\u54c8\u5e0c\u7b97\u6cd5\u7684\u5b8c\u6574\u6027\u662f\u51b3\u5b9a\u8bc1\u4e66\u5b89\u5168\u6027\u7684\u5173\u952e\u56e0\u7d20\u3002\u54c8\u5e0c\u7b97\u6cd5\u7684\u5f31\u70b9\u53ef\u80fd\u5bfc\u81f4\u653b\u51fb\u8005\u5728\u67d0\u4e9b\u60c5\u51b5\u4e0b\u80fd\u591f\u83b7\u5f97\u4f2a\u9020\u7684\u8bc1\u4e66\u3002\u7531\u4e8e\u6280\u672f\u7684\u5347\u7ea7\u548c\u5df2\u77e5\u7684\u65b0\u578b\u653b\u51fb\uff0c\u6b64\u7c7b\u653b\u51fb\u7684\u53ef\u884c\u6027\u5df2\u7ecf\u5927\u4e3a\u63d0\u5347\u3002\u56e0\u6b64\uff0c\u4e0d\u63a8\u8350\u4f7f\u7528\u65e7\u7b97\u6cd5\uff0c\u5bf9\u4e8e\u65e7\u7b97\u6cd5\u7684\u652f\u6301\u6700\u7ec8\u4e5f\u4f1a\u505c\u6b62\u3002", "localization_tags": [], "locale": "zh-CN", "last_edit": "2015-07-09T23:10:23", "review_tags": []}, {"uuid": "6c90ada3-6388-417d-b26e-4b98283ca1fe", "title": "\u5f31\u7c3d\u7ae0\u6f14\u7b97\u6cd5", "url": "/zh-TW/docs/Security/%E5%BC%B1%E7%B0%BD%E7%AB%A0%E6%BC%94%E7%AE%97%E6%B3%95", "tags": [], "summary": "\u5728\u7c3d\u7f72\u6191\u8b49\u6642\uff0c\u96dc\u6e4a\u6f14\u7b97\u6cd5\u7684\u5b8c\u6574\u6027\u662f\u975e\u5e38\u91cd\u8981\u7684\u4e00\u74b0\u3002\u96dc\u6e4a\u6f14\u7b97\u6cd5\u7684\u6f0f\u6d1e\u53ef\u80fd\u5c0e\u81f4\u653b\u64ca\u8005\u7372\u53d6\u5047\u9020\u7684\u6191\u8b49\u3002\u96a8\u8457\u79d1\u6280\u767c\u5c55\u51fa\u73fe\u66f4\u591a\u53ef\u884c\u7684\u653b\u64ca\u65b0\u624b\u6cd5\uff0c\u4e26\u4e0d\u5efa\u8b70\u7e7c\u7e8c\u4f7f\u7528\u820a\u7684\u6f14\u7b97\u6cd5\uff0c\u4e14\u9019\u4e9b\u6f14\u7b97\u6cd5\u6700\u7d42\u8a72\u88ab\u79fb\u9664\u3002", "localization_tags": [], "locale": "zh-TW", "last_edit": "2015-09-17T23:36:44", "review_tags": ["technical", "editorial"]}], "modified": "2016-04-24T05:09:59", "label": "Weak Signature Algorithm", "localization_tags": [], "locale": "en-US", "id": 129665, "last_edit": "2016-04-24T05:09:56", "summary": "Editorial review completed.", "sections": [{"id": "Why_Signature_Algorithms_Matter", "title": "Why Signature Algorithms Matter"}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}, {"id": "Learn_More", "title": "Learn More"}], "slug": "Web/Security/Weak_Signature_Algorithm", "review_tags": ["technical"]}