{"json_modified": "2015-06-25T23:32:10.363359", "slug": "Security/Firma_Algoritmo_Debole", "tags": ["Guida", "Sicurezza", "Crittografia"], "locale": "it", "title": "Algoritmo di firma debole", "translations": [{"title": "Weak Signature Algorithm", "url": "/en-US/docs/Web/Security/Weak_Signature_Algorithm", "tags": ["Guide", "Security", "guide", "Cryptography"], "summary": "The strength of the hash algorithm used in signing a digital certificate is a critical element of the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can create or obtain fraudulent certificates. As new attacks are found and improvements in available technology make attacks more feasible, the use of older algorithms is discouraged and support for them is eventually removed.", "localization_tags": [], "locale": "en-US", "last_edit": "2015-06-25T00:06:03", "review_tags": ["technical", "editorial"]}, {"title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\u5728\u7b7e\u7f72\u8bc1\u4e66\u65f6\uff0c\u54c8\u5e0c\u7b97\u6cd5\u7684\u5b8c\u6574\u6027\u662f\u51b3\u5b9a\u8bc1\u4e66\u5b89\u5168\u6027\u7684\u5173\u952e\u56e0\u7d20\u3002\u54c8\u5e0c\u7b97\u6cd5\u7684\u5f31\u70b9\u53ef\u80fd\u5bfc\u81f4\u653b\u51fb\u8005\u5728\u67d0\u4e9b\u60c5\u51b5\u4e0b\u80fd\u591f\u83b7\u5f97\u4f2a\u9020\u7684\u8bc1\u4e66\u3002\u7531\u4e8e\u6280\u672f\u7684\u5347\u7ea7\u548c\u5df2\u77e5\u7684\u65b0\u578b\u653b\u51fb\uff0c\u6b64\u7c7b\u653b\u51fb\u7684\u53ef\u884c\u6027\u5df2\u7ecf\u5927\u4e3a\u63d0\u5347\u3002\u56e0\u6b64\uff0c\u4e0d\u63a8\u8350\u4f7f\u7528\u65e7\u7b97\u6cd5\uff0c\u5bf9\u4e8e\u65e7\u7b97\u6cd5\u7684\u652f\u6301\u6700\u7ec8\u4e5f\u4f1a\u505c\u6b62\u3002", "localization_tags": [], "locale": "zh-CN", "last_edit": "2015-05-23T00:04:34", "review_tags": []}, {"title": "\u0421\u043b\u0430\u0431\u044b\u0439 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c \u043f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\u0426\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430 \u0445\u0435\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u0433\u043e \u0432 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u0438\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0430\u0436\u043d\u044b\u043c \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u043c \u0432 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430. \u0421\u043b\u0430\u0431\u044b\u0435 \u043c\u0435\u0441\u0442\u0430 \u0445\u044d\u0448-\u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u043c, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b. \u0421 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435\u043c \u043d\u043e\u0432\u044b\u0445 \u0432\u0438\u0434\u043e\u0432 \u0430\u0442\u0430\u043a \u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439, \u0447\u0442\u043e \u043e\u0431\u043b\u0435\u0433\u0447\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438, \u0441\u0442\u0430\u0440\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u0441\u0442\u0430\u043d\u043e\u0432\u044f\u0442\u0441\u044f \u043d\u0435\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c\u044b\u043c\u0438 \u0438 \u0438\u0445 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0441\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u043f\u0440\u0435\u043a\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f.", "localization_tags": [], "locale": "ru", "last_edit": "2015-05-28T03:06:07", "review_tags": []}, {"title": "Algoritmo de Assinatura Fraco", "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "summary": "A integridade do algoritmo de hash usado na assinatura de um certificado \u00e9 um elemento cr\u00edtico para a seguran\u00e7a do certificado. Fraquezas em algoritmos de hash podem levar a situa\u00e7\u00f5es em que os atacantes podem obter certificados fraudulentos. \u00c0 medida que novos ataques s\u00e3o encontrados e melhorias nas tecnologias dispon\u00edveis tornam ataques mais vi\u00e1veis, o uso de algoritmos antigos \u00e9 desencorajado e o suporte eventualmente removido.", "localization_tags": [], "locale": "pt-BR", "last_edit": "2015-01-16T09:16:05", "review_tags": []}, {"title": "Weak Signature Algorithmus", "url": "/de/docs/Sicherheit/Weak_Signature_Algorithm", "tags": [], "summary": "Editorial review completed.", "localization_tags": [], "locale": "de", "last_edit": "2015-05-23T07:17:31", "review_tags": []}, {"title": "Algorithme de signature faible", "url": "/fr/docs/S%C3%A9curit%C3%A9/Algorithme_Signature_Faible", "tags": ["Guide", "Security"], "summary": "L'int\u00e9grit\u00e9 d'un algorithme de hachage utilis\u00e9 pour signer un certificat est un \u00e9l\u00e9ment critique de sa s\u00e9curit\u00e9. Les faiblesses des algorithmes de hachage peuvent conduire \u00e0 des situations dans lesquelles les attaquants peuvent obtenir frauduleusement des certificats. Comme de nouvelles attaques apparaissent r\u00e9guli\u00e8rement et que les am\u00e9liorations technologiques les rendent plus faciles \u00e0 mettre en oeuvre, l'utilisation d'algorithmes d\u00e9pass\u00e9s n'est pas conseill\u00e9e et leur support, \u00e9ventuellement arr\u00eat\u00e9.", "localization_tags": [], "locale": "fr", "last_edit": "2015-06-03T11:17:35", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/ar/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "ar", "last_edit": "2015-04-12T10:35:29", "review_tags": []}, {"title": "Algoritmo de Firma D\u00e9bil", "url": "/es/docs/Seguridad/Weak_Signature_Algorithm", "tags": ["Espa\u00f1ol"], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "es", "last_edit": "2015-05-09T04:12:43", "review_tags": []}, {"title": "\u5f31\u7c3d\u7ae0\u6f14\u7b97\u6cd5", "url": "/zh-TW/docs/Security/%E5%BC%B1%E7%B0%BD%E7%AB%A0%E6%BC%94%E7%AE%97%E6%B3%95", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "zh-TW", "last_edit": "2015-06-17T18:12:12", "review_tags": []}, {"title": "Algoritma Tanda Tangan Lemah", "url": "/id/docs/Security/Algoritma_Tanda_Tangan_Lemah", "tags": [], "summary": "Integritas algoritma hash yang digunakan dalam menandatangani sertifikat merupakan elemen penting dalam keamanan sertifikat. Kelemahan dalam algoritma hash dapat menyebabkan situasi di mana penyerang dapat memperoleh sertifikat palsu. Sebagaimana\u00a0ditemukan serangan baru dan perbaikan dalam teknologi yang tersedia membuat serangan lebih mungkin dilakukan, penggunaan algoritma lama dikurangi dan dukungan akhirnya dihapus.", "localization_tags": ["inprogress"], "locale": "id", "last_edit": "2015-05-20T00:10:23", "review_tags": ["technical", "editorial"]}, {"title": "Weak Signature Algorithm", "url": "/nl/docs/Security/Weak_Signature_Algorithm", "tags": ["Beveiliging", "md5", "sha-1", "certificaten", "hashing-algoritme", "algoritme", "cryptografie"], "summary": "De integriteit of deugdzaamheid van een hashing-algoritme dat gebruikt wordt bij het ondertekenen van digitale certificaten is een kritiek element in de beveiliging ervan.
Zwakke punten in hashing-algoritmes vergemakkelijkt aanvallen bedoeld om frauduleuze certificaten te bemachtigen.", "localization_tags": [], "locale": "nl", "last_edit": "2015-03-15T16:57:15", "review_tags": ["technical"]}, {"title": "Weak Signature Algorithm", "url": "/cs/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Integrita hash algoritmu pou\u017eit\u00e9ho p\u0159i podpisu certifik\u00e1tu je kritick\u00fdm prvkem bezpe\u010dnosti certifik\u00e1tu. Nedostatky v hash algoritmy mohou v\u00e9st k situac\u00edm, kter\u00e9 mohou \u00fato\u010dn\u00edci z\u00edskat podvodn\u00e9 certifik\u00e1ty. Jako nov\u00e9 \u00fatoky jsou nalezeny a zlep\u0161en\u00ed v dostupn\u00fdch technologi\u00ed, aby \u00fatoky sch\u016fdn\u011bj\u0161\u00ed, vyu\u017eit\u00ed star\u0161\u00edch algoritm\u016f je znechucen\u00fd a podpora nakonec odstran\u011bny.", "localization_tags": ["inprogress"], "locale": "cs", "last_edit": "2015-03-26T13:25:40", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/th/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "th", "last_edit": "2015-04-11T12:39:37", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/ko/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "\uc778\uc99d\uc11c\ub97c \uc11c\uba85\ud558\ub294\ub370 \uc0ac\uc6a9\ub418\ub294 \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ubb34\uacb0\uc131\uc740 \uc778\uc99d\uc11c\uc758 \ubcf4\uc548\uc5d0 \uc911\uc694\ud55c \uc694\uc18c\uc785\ub2c8\ub2e4. \ud574\uc2dc \uc54c\uace0\ub9ac\uc998\uc758 \ucde8\uc57d\uc131\uc740 \uacf5\uaca9\uc790\uac00 \uc704\uc870 \uc778\uc99d\uc11c\ub97c \ub9cc\ub4dc\ub294 \uc0c1\ud669\uc744 \uc77c\uc73c\ud0ac \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uba74 \uc0c8\ub85c\uc6b4 \uacf5\uaca9 \uae30\ubc95\uc774 \ubc1c\uacac\ub418\uac70\ub098 \uae30\uc874\uc758 \uacf5\uaca9 \uae30\uc220\uc774 \uac1c\uc120\ub420 \uc218\ub85d \ub354\uc6b1 \ub354 \uacf5\uaca9 \ubc1b\uae30 \uc26c\uc6cc\uc9d1\ub2c8\ub2e4. \uc624\ub798\ub41c \uc54c\uace0\ub9ac\uc998\uc744 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\uae30\ub97c \uad8c\uc7a5\ud558\uba70 \uacb0\uad6d \uc774\uc5d0 \ub300\ud55c \uc9c0\uc6d0\uc740 \uc911\ub2e8\ub420 \uac83\uc785\ub2c8\ub2e4.", "localization_tags": ["inprogress"], "locale": "ko", "last_edit": "2015-04-02T23:48:07", "review_tags": []}, {"title": "Zay\u0131f \u0130mza Algoritmas\u0131", "url": "/tr/docs/Security/Zat%C4%B1f_%C4%B0mza_Algoritmas%C4%B1", "tags": ["K\u0131lavuz G\u00fcvenlik Algoritmalar"], "summary": "Sertifika imzalamada kullan\u0131lan imza algoritmalar\u0131 sertifikalar\u0131n g\u00fcvenli\u011finin kritik bir eleman\u0131d\u0131r. \u0130mza algoritmalar\u0131ndak zay\u0131fl\u0131klar sald\u0131rganlar\u0131 sahte sertifikalar \u00fcretmelerine yol a\u00e7abilir. Yeni atak t\u00fcrlerini bulunmas\u0131 ve teknolojideki geli\u015fmeler imzalara kar\u015f\u0131 yap\u0131lan sald\u0131r\u0131larda ba\u015far\u0131l\u0131 olmay\u0131 daha fazla m\u00fcmk\u00fcn hale getirmi\u015ftir. Bu sebeplerden eski algoritmalar\u0131n kullan\u0131m\u0131ndan vazge\u00e7ilmekte ve nihayetinde destek kald\u0131r\u0131lmaktad\u0131r.", "localization_tags": [], "locale": "tr", "last_edit": "2015-05-15T04:30:15", "review_tags": []}], "modified": "2015-06-25T23:32:09", "label": "Algoritmo di firma debole", "localization_tags": [], "url": "/it/docs/Security/Firma_Algoritmo_Debole", "last_edit": "2015-06-25T23:32:09", "summary": "L'integrit\u00e0 del algoritmo hash utilizzato nella firma di un certificato digitale \u00e8 un elemento critico per la sicurezza del certificato stesso. Debolezze negli algoritmi hash possono condurre a situazioni in cui degli attaccanti possono creare od ottenere certificati fraudolenti. A mano a mano che nuovi attacchi vengono scoperti e gli sviluppi delle tecnologie disponibili rendono gli attacchi maggiormente fattibili, l'utilizzo degli algoritmi pi\u00f9 vecchi viene scoraggiato e il relativo supporto alla fine viene rimosso.", "sections": [{"id": "Perch\u00e9_gli_algoritmi_di_firma_contano", "title": "Perch\u00e9 gli algoritmi di firma contano"}, {"id": "SHA-2", "title": "SHA-2"}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}, {"id": "Scopri_di_pi\u00f9", "title": "Scopri di pi\u00f9"}], "id": 135133, "review_tags": []}