It's imperative that browsers and CAs stop using MD5
, and migrate to more robust alternatives such as SHA-2 and the upcoming SHA-3 standard," insists Lenstra.
Stevens, Lenstra and de Weger were part of a larger international team of researchers who, in 2008, demonstrated a practical MD5
collision attack which allowed them to create a rogue SSL certificate trusted by all browsers.
The application should generate and verify cryptographic hashes or checksums for images, disks and files using the MD5
algorithm at a minimum.
Each Verification Station[R] module uses an MD5
hash (or digital fingerprint) to compare the master and target drive.
Other supported security protocols include AES, DES, 3DES, MD5
, and SHA.
Other security IP cores Jetstream Media Technologies offers include: AES family, CCM family, GCM, XTS cores, configurable secure hashing core supporting MD5
, SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512, Triple-DES, and the public key modular exponentiation accelerator for RSA([R])/Diffie-Hellman up to 4096 bits.
The configurable hashing core supports SHA-1, SHA-224, SHA-256, SHA-384, SHA-512 and MD5