The move was inevitable, as SHA-1
has been considered obsolete by security experts for several years.
This memorandum revises previously directed DoD SHA-1
to SHA-256 transition plans, essentially moving their completion timeline forward by approximately one year.
The attack took nine quintillion SHA-1
computations in total and required 6,500 years of CPU computation and 110 years of GPU computation to complete, (https://security.
In addition to the world's best random number generator (RNG) and AES Encryption Engine in the previous processor generation, the VIA C7 processor adds SHA-1
and SHA-256 hashing for secure message digests, and a hardware based Montgomery Multiplier supporting key sizes up to 32K in length to accelerate public key cryptography, such as RSA(TM).
This algorithm is the next generation answer beyond SHA-1
for data protection.
According to a report released this week by a team at Shandong University in China, the SHA-1
algorithm that supports the digital signatures used in popular SSL browser security and encryption can be successfully attacked.
AirGuard Wireless Solutions implement leading cryptographic technologies including: AES, 3DES, SHA-1
, HMAC SHA-1
CREDANT's FIPS-approved algorithms include Triple DES, AES, SHA-1
and RNG algorithms.