Crypto company Venafi points out potential holes in Yahoo’s processes and policies around cryptography and digital certificates, any of which could have been exploited in the breach to move data off the Yahoo network.
Tag Archives: md5
SLOTH Attacks Up Ante on SHA-1, MD5 Deprecation
Researchers have demonstrated new collision attacks against SHA-1 and MD5 implementations in TLS, IKE and SSH.
Undermining Authenticode
Have you ever heard of Authenticode? This article not only explains what’s behind the name but also where its weaknesses lie.
The post Undermining Authenticode appeared first on Avira Blog.
MD5: The broken algorithm
When you have to work with thousands of files per day, it is generally a good idea to generate a hash of a file that would identify it on a unique way. A hash function is any function that can be used to map digital data of arbitrary size to digital data of fixed size.
The post MD5: The broken algorithm appeared first on Avira Blog.