{"json_modified": "2015-01-16T09:16:06.116371", "slug": "Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "locale": "pt-BR", "title": "Algoritmo de Assinatura Fraco", "translations": [{"title": "Weak Signature Algorithm", "url": "/en-US/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": [], "locale": "en-US", "last_edit": "2014-11-17T11:43:13", "review_tags": []}, {"title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/%E5%BC%B1%E7%AD%BE%E5%90%8D%E7%AE%97%E6%B3%95", "tags": [], "summary": "", "localization_tags": [], "locale": "zh-CN", "last_edit": "2014-11-21T15:01:54", "review_tags": []}, {"title": "\u041e\u0441\u043b\u0430\u0431\u043b\u0435\u043d\u0438\u0435_\u0410\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430_\u041f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": [], "locale": "ru", "last_edit": "2015-01-06T05:49:33", "review_tags": []}], "modified": "2015-01-16T09:16:05", "label": "Algoritmo de Assinatura Fraco", "localization_tags": [], "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "last_edit": "2015-01-16T09:16:05", "summary": "A integridade do algoritmo de hash usado na assinatura de um certificado \u00e9 um elemento cr\u00edtico para a seguran\u00e7a do certificado. Fraquezas em algoritmos de hash podem levar a situa\u00e7\u00f5es em que os atacantes podem obter certificados fraudulentos. \u00c0 medida que novos ataques s\u00e3o encontrados e melhorias nas tecnologias dispon\u00edveis tornam ataques mais vi\u00e1veis, o uso de algoritmos antigos \u00e9 desencorajado e o suporte eventualmente removido.", "sections": [{"id": "A_Import.C3.A2ncia_dos_Algoritmos_de_Assinatura", "title": "A Import\u00e2ncia dos Algoritmos de Assinatura"}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}], "id": 134193, "review_tags": []}