SHA-1 (secure hash algorithm) in many cryptographic security protocols are widely used, including TLS and SSL, PGP, SSH, S / MIME and IPSec, we usually when downloaded from the Internet some mirrors and important documents, comparing MD5 and SHA-1. However, in 2005, the password scientists to prove that SHA-1's crack speed than expected to increase by 2000 times. The United States research agency said, cloud based cluster computing, at least as long as tens of thousands of dollars will be able to achieve the purpose of. Now, Microsoft once again announced that from February 2017 onwards, Microsoft Edge and Explorer Internet will give up the TLS signed SHA-1 certificate.
At the same time from the Windows 10 is about to be pushed in July this year, the anniversary of the start of the update, Edge and IE will no longer consider the SHA-1 certificate for the site to provide security protection certification, they will remove the address bar lock icon.
Of course, although the address bar to remove the lock, but the access is no problem.
It is worth mentioning that, Mozilla has also announced that it will start from July 1st next year to fully stop supporting the SSL algorithm SHA-1.
Microsoft and password experts suggest that the site administrators and developers as soon as possible to the SHA-2, it can help prevent agencies such as the U.S. government through the break into the computer.
In addition, more than 3 million of the use of XP SP2 Windows does not support the SHA-2 signature algorithm, the number of low-end mobile phone users is huge.
Sha (full name of the secure hash algorithm) secure hash algorithm translated, is a can of arbitrary length message is mapped into a fixed length hash value (also known as the message digest) algorithm. SHA family of five algorithms, respectively, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, after the four are sometimes referred to as SHA-2.