Certification authorities always sign certificates using a specific algorithm. A hash method is usually part of this algorithm. SHA-1 has been used as a hash algorithm for signing SSL certificates for over ten years now; usually with RSA as the encryption algorithm. So see the hash algorithm as the signature of the certificate authority that underpins the integrity of the certificate as a hashed value.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht.