5.1.1 Use of Semi-weak Algorithms

Office

The current protocol uses SHA-1, as described in [RFC3174], when computing the message digest. While there are no known practical attacks against SHA-1 at this point, it is showing signs of weakness.

Show: