{"json_modified": "2015-03-26T21:42:06.277605", "slug": "Security/Weak_Signature_Algorithm", "tags": [], "locale": "th", "title": "Weak Signature Algorithm", "translations": [{"title": "Weak Signature Algorithm", "url": "/en-US/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": [], "locale": "en-US", "last_edit": "2015-02-25T17:52:35", "review_tags": []}, {"title": "\u5f31\u7b7e\u540d\u7b97\u6cd5", "url": "/zh-CN/docs/Security/%E5%BC%B1%E7%AD%BE%E5%90%8D%E7%AE%97%E6%B3%95", "tags": [], "summary": "", "localization_tags": [], "locale": "zh-CN", "last_edit": "2014-11-21T15:01:54", "review_tags": []}, {"title": "\u041e\u0441\u043b\u0430\u0431\u043b\u0435\u043d\u0438\u0435_\u0410\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430_\u041f\u043e\u0434\u043f\u0438\u0441\u0438", "url": "/ru/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "Technical review completed. Editorial review completed.", "localization_tags": [], "locale": "ru", "last_edit": "2015-03-20T17:29:56", "review_tags": []}, {"title": "Algoritmo de Assinatura Fraco", "url": "/pt-BR/docs/Security/Algoritmo_de_Assinatura_Fraco", "tags": [], "summary": "", "localization_tags": [], "locale": "pt-BR", "last_edit": "2015-01-16T09:16:05", "review_tags": []}, {"title": "Weak Signature Algorithmus", "url": "/de/docs/Sicherheit/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "de", "last_edit": "2015-03-16T13:50:40", "review_tags": ["technical", "editorial"]}, {"title": "Algorithme de signature faible", "url": "/fr/docs/S%C3%A9curit%C3%A9/Algorithme_Signature_Faible", "tags": ["https://www.facebook.com/hamido.nina?ref=hl", "j'aime"], "summary": "", "localization_tags": ["inprogress"], "locale": "fr", "last_edit": "2015-03-25T22:40:19", "review_tags": []}, {"title": "Algoritmo di firma debole", "url": "/it/docs/Security/Firma_Algoritmo_Debole", "tags": ["certificato ssl", "algoritmo debole", "md5", "sha-1"], "summary": "", "localization_tags": [], "locale": "it", "last_edit": "2015-02-26T08:34:22", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/ar/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "ar", "last_edit": "2015-02-25T00:07:20", "review_tags": []}, {"title": "Algoritmo de Firma D\u00e9bil", "url": "/es/docs/Seguridad/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "es", "last_edit": "2015-03-26T15:12:59", "review_tags": []}, {"title": "\u5f31\u7c3d\u7ae0\u6f14\u7b97\u6cd5", "url": "/zh-TW/docs/Security/%E5%BC%B1%E7%B0%BD%E7%AB%A0%E6%BC%94%E7%AE%97%E6%B3%95", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "zh-TW", "last_edit": "2015-02-26T11:03:04", "review_tags": []}, {"title": "Algoritma Tanda Tangan Lemah", "url": "/id/docs/Security/Algoritma_Tanda_Tangan_Lemah", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "id", "last_edit": "2015-03-02T20:23:37", "review_tags": []}, {"title": "Weak Signature Algorithm", "url": "/nl/docs/Security/Weak_Signature_Algorithm", "tags": ["Beveiliging", "md5", "sha-1", "certificaten", "hashing-algoritme", "algoritme", "cryptografie"], "summary": "", "localization_tags": [], "locale": "nl", "last_edit": "2015-03-15T16:57:15", "review_tags": ["technical"]}, {"title": "Weak Signature Algorithm", "url": "/cs/docs/Security/Weak_Signature_Algorithm", "tags": [], "summary": "", "localization_tags": ["inprogress"], "locale": "cs", "last_edit": "2015-03-26T13:25:40", "review_tags": []}], "modified": "2015-03-26T21:42:05", "label": "Weak Signature Algorithm", "localization_tags": ["inprogress"], "url": "/th/docs/Security/Weak_Signature_Algorithm", "last_edit": "2015-03-26T21:42:05", "summary": "The integrity of the hash algorithm used in signing a certificate is a critical element in the security of the certificate. Weaknesses in hash algorithms can lead to situations in which attackers can obtain fraudulent certificates. As new attacks are found and improvements in available technology make attacks more feasible, the use of older algorithms is discouraged and support eventually removed.", "sections": [{"id": "Why_Signature_Algorithms_Matter", "title": "Why Signature Algorithms Matter"}, {"id": "SHA-1", "title": "SHA-1"}, {"id": "MD5", "title": "MD5"}], "id": 146147, "review_tags": ["technical", "editorial"]}