Add to Favorites On October 8, 2015, a team of international cryptography researchers warned of a significantly increased risk in using SHA-1 certificates, and recommended that administrators accelerate their migration to SHA-2 certificates. The risk is that, with enough computing power, an attacker can craft a fake certificate that in all key respects appears to […]
Category: XII. SHA-2 Zone
Replacing SHA-1 with SHA-2 certificates
Add to Favorites How to Replace SHA-1 with SHA-2 certificates: Depending on what Certificate Authority and how you purchased your certificate a reissue of the certificate may be available to you. This would require a New CSR to be generated typically with a reissue or replace option available in a portal that is used to […]