Summary
Information technology uses various checksums to verify data integrity. For example, when an operating system update file is downloaded to a computer, its checksum is verified before installation. This occurs several times automatically without the user even noticing. Checksums are generated using cryptographic hash functions. There are different kinds of hash functions. One of these is SHA-1 (Secure Hash Algorithm 1), which has been widely used in digital signatures since 1995. A practical attack against the SHA-1 hash function has been released, and therefore it should no longer be used to verify integrity.
Details
Event Type: NCSC-FI Announcement
Publication Date: Thu, 06 Feb 2020 10:57:52 GMT
Source: National Cyber Security Centre Finland
Key Points:
- Official announcement from NCSC-FI
- See full article at source URL for complete details
Impact Assessment
Severity: Varies by content type
Scope: National (Finland) or International
Notes
Source is in English from NCSC-FI’s official news portal. This entry is part of the NCSC-FI RSS feed historical archive covering 2019-2021 cybersecurity developments in Finland.
Processing Note: Generated from RSS feed entries 401-500. For detailed technical information, exploitability details, or specific mitigation guidance, refer to the source URL.