Summary

Information technology uses various checksums to verify data integrity. For example, when an operating system update file is downloaded to a computer, its checksum is verified before installation. This occurs several times automatically without the user even noticing. Checksums are generated using cryptographic hash functions. There are different kinds of hash functions. One of these is SHA-1 (Secure Hash Algorithm 1), which has been widely used in digital signatures since 1995. A practical attack against the SHA-1 hash function has been released, and therefore it should no longer be used to verify integrity.

Details

Event Type: NCSC-FI Announcement

Publication Date: Thu, 06 Feb 2020 10:57:52 GMT

Source: National Cyber Security Centre Finland

Key Points:

  • Official announcement from NCSC-FI
  • See full article at source URL for complete details

Impact Assessment

Severity: Varies by content type

Scope: National (Finland) or International

Notes

Source is in English from NCSC-FI’s official news portal. This entry is part of the NCSC-FI RSS feed historical archive covering 2019-2021 cybersecurity developments in Finland.

Processing Note: Generated from RSS feed entries 401-500. For detailed technical information, exploitability details, or specific mitigation guidance, refer to the source URL.