why is SHA1 used? How do I get SHA256 to be used?
Hauke Laging
mailinglisten at hauke-laging.de
Thu Jul 12 06:09:44 CEST 2012
Am Mi 11.07.2012, 23:13:00 schrieb vedaal:
> (A clever, malicious attacker could backdate the clock,
> and have a forgery of something you did in the past,
> when you couldn't claim:
>
> "Hey, that's an obvious forgery!
> I'm on record as saying I would never use SHA1 to sign anything anymore!")
So what?
A signature over a broken hash alone is worthless no matter what its timestamp
says. If you want to prove anything by a signature at a time when the hash is
considered broken you have to prove that the signature existed before that
time. And this proof can obviously not be based on the broken hash.
Thus you have to sign all signatures you want to be able to use after the
announcement that they are broken (which can, of course, come surprisingly) by
another hash or rather you have to get them signed by a trusted third party if
you want to use them against someone.
Hauke
--
PGP: D44C 6A5B 71B0 427C CED3 025C BD7D 6D27 ECCB 5814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 555 bytes
Desc: This is a digitally signed message part.
URL: </pipermail/attachments/20120712/52a9636a/attachment-0001.pgp>
More information about the Gnupg-users
mailing list