{"json_modified": "2015-03-15T16:57:16.298436", "slug": "Security/Weak_Signature_Algorithm", "tags": ["Beveiliging", "md5", "sha-1", "certificaten", "hashing-algoritme", "algoritme", "cryptografie"], "locale": "nl", "title": "Weak Signature Algorithm", "translations": [{"title": "Weak Signature Algorithm", "url": "/en-US/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": [], "locale": "en-US", "last_edit": "2015-02-25T17:52:35", "review_tags": []}, {"title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/%E5%BC%B1%E7%AD%BE%E5%90%8D%E7%AE%97%E6%B3%95", "tags": [], "summary": "", "localization_tags": [], "locale": "zh-CN", "last_edit": "2014-11-21T15:01:54", "review_tags": []}, {"title": "\u041e\u0441\u043b\u0430\u0431\u043b\u0435\u043d\u0438\u0435_\u0410\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430_\u041f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": [], "locale": "ru", "last_edit": "2015-01-06T05:49:33", "review_tags": []}, {"title": "Algoritmo de Assinatura Fraco", "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "summary": "", "localization_tags": [], "locale": "pt-BR", "last_edit": "2015-01-16T09:16:05", "review_tags": []}, {"title": "Weak Signature Algorithmus", "url": "/de/docs/Sicherheit/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "de", "last_edit": "2015-03-14T10:46:30", "review_tags": []}, {"title": "Algorithme de signature faible", "url": "/fr/docs/S%C3%A9curit%C3%A9/Algorithme_Signature_Faible", "tags": ["https://www.facebook.com/hamido.nina?ref=hl", "j'aime"], "summary": "", "localization_tags": [], "locale": "fr", "last_edit": "2015-03-15T04:53:15", "review_tags": []}, {"title": "Algoritmo di firma debole", "url": "/it/docs/Security/Firma_Algoritmo_Debole", "tags": ["certificato ssl", "algoritmo debole", "md5", "sha-1"], "summary": "", "localization_tags": [], "locale": "it", "last_edit": "2015-02-26T08:34:22", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/ar/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "ar", "last_edit": "2015-02-25T00:07:20", "review_tags": []}, {"title": "Algoritmo de Firma D\u00e9bil", "url": "/es/docs/Seguridad/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "es", "last_edit": "2015-02-26T05:22:06", "review_tags": []}, {"title": "\u5f31\u7c3d\u7ae0\u6f14\u7b97\u6cd5", "url": "/zh-TW/docs/Security/%E5%BC%B1%E7%B0%BD%E7%AB%A0%E6%BC%94%E7%AE%97%E6%B3%95", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "zh-TW", "last_edit": "2015-02-26T11:03:04", "review_tags": []}, {"title": "Algoritma Tanda Tangan Lemah", "url": "/id/docs/Security/Algoritma_Tanda_Tangan_Lemah", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "id", "last_edit": "2015-03-02T20:23:37", "review_tags": []}], "modified": "2015-03-15T16:57:15", "label": "Weak Signature Algorithm", "localization_tags": [], "url": "/nl/docs/Security/Weak_Signature_Algorithm", "last_edit": "2015-03-15T16:57:15", "summary": "De integriteit of deugdzaamheid van een hashing-algoritme dat gebruikt wordt bij het ondertekenen van digitale certificaten is een kritiek element in de beveiliging ervan.
Zwakke punten in hashing-algoritmes vergemakkelijkt aanvallen bedoeld om frauduleuze certificaten te bemachtigen.", "sections": [{"id": "Waarom_aangetekende_algoritmes_van_belang_zijn.", "title": "Waarom aangetekende algoritmes van belang zijn."}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}], "id": 145545, "review_tags": ["technical"]}