
Standards for the use of quantum-safe mechanisms in SSH are currently being developed and tested. The BSI intends to recommend quantum-safe mechanisms in this Technical Guideline (in hybrid use with recommended classical mechanisms) as soon …
In dieser Technischen Richtlinie veröffentlicht das Bundesamt für Sicherheit in der Informations-technik (BSI) eine Bewertung der Sicherheit für ausgewählte kryptographische Verfahren, verbun-den mit einer langfristigen Orientierung für ihren Einsatz.
Diese Technische Richtlinie gibt Empfehlungen für den Einsatz des kryptographischen Protokolls Secure Shell (SSH). Mit diesem Protokoll kann ein sicherer Kanal in einem unsicheren …
BSI - Technical Guideline - BSI TR-02102-1 - Bund.de
With this Technical Guideline, the Federal Office for Information Security (BSI) provides an assessment of the security and long-term orientation for selected cryptographic mechanisms.
SHA-256 - TMS Cryptography Pack - TMS Support Center
May 19, 2020 · there are two places where i need it: - the first, to build a base 64 encoded hash over a string --> works fine - the second is follow the fiscal element deliver a serial number and a public key base64 coded defined as follow: tseserialNumber base64 string Raw SHA-256 hash over the public key that belongs to the private key generating signatures.
NIST Retires SHA-1 Cryptographic Algorithm | NIST
Dec 15, 2022 · The SHA-1 algorithm, one of the first widely used methods of protecting electronic information, has reached the end of its useful life, according to security experts at the National Institute of Standards and Technology (NIST).
Cryptographic Mechanisms: Recommendations and Key Lengths
The recommended key sizes for RSA and mechanisms based on the discrete log problem in finite fields have been adjusted accordingly. 2018-01 15.12.2017 Fundamental revision of the section on prime number generation. Revision of the statement on SHA-1 due to the publication of a SHA-1 collision.
„Kollisionsangriffe gegen die Zertifikaterstellung mit SHA-1 können von vornherein verhindert werden, wenn folgendes gilt: Es wird das X.509v3 Format gemäß ISIS-MTT verwendet. Die Seriennummer ("serialNumber") des Zertifikats hat eine genügend hohe Entropie h …
Update on SHA-1 | SpringerLink
Finally, we show that for a reduced version of SHA-1, with 53 rounds instead of 80, it is possible to find collisions in less than 2 80 operations. This research was supported financially by the A-SIT, Austria and by the BSI, Germany. Biham, E., Chen, R.: Near-collisions of SHA-0. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 290–305.
Keylength - BSI Cryptographic Key Length Report (2020)
Cryptographic key length recommendations extract from BSI report, Cryptographic Mechanisms: Recommendations and Key Lengths.
- Some results have been removed