Entrust Inc. has announced its secure sockets layer certificates are not affected by a security hole discovered last month at the Chaos Communication Congress.

On Dec. 30, a team of European researchers demonstrated they were able to exploit a weakness in the MD5 hash algorithm in VeriSign’s automated RapidSSL service. As a result, they said, they were able to impersonate Web sites, including e-commerce sites using the HTTPs protocol.

Addison, Tex.-based-based Entrust, which makes public key infrastructure software, said its SSL certificates use SHA-1, a hash algorithm that is not susceptible to the MD5 vulnerability.

Entrust published a paper on its Web sites listing recommended security precautions.

Would you recommend this article?

Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication. Click this link to send me a note →

Jim Love, Chief Content Officer, IT World Canada
Previous articleFeds need to be firm with Enhanced 911
Next articleIf SOA is truly dead . . .