Hi David,

You're correct that HMAC's security is still fine when used with SHA-1,
HMAC-MD5 is even secure believe it or not.

That said, I'd generally recommend people migrate to HMAC-SHA-256  anyways,
to make analyzing their software easier.

Alex

On Wed, Mar 15, 2017 at 1:48 PM, David Lord <david...@gmail.com> wrote:

> Hello cryptography,
>
> Over at the Flask repos, we've had a number of requests to use SHA-256
> instead of SHA-1 in a couple places.
> Werkzeug defaults to SHA-1 as part of PBKDF2 to generate password hashes.
> ItsDangerous defaults to SHA-1 as part of HMAC signatures.
>
> After some discussion I concluded that as used in those two methods,
> SHA-1's collision issues were not relevant.
> However, I'd like to get a second opinion from the cryptography experts.
>
> I can change the default to SHA-256, but if it's not actually making
> things more secure then that's just increasing time and space for no reason.
>
> Thanks,
> David
>
> _______________________________________________
> Cryptography-dev mailing list
> Cryptography-dev@python.org
> https://mail.python.org/mailman/listinfo/cryptography-dev
>
>


-- 
"I disapprove of what you say, but I will defend to the death your right to
say it." -- Evelyn Beatrice Hall (summarizing Voltaire)
"The people's good is the highest law." -- Cicero
GPG Key fingerprint: D1B3 ADC0 E023 8CA6
_______________________________________________
Cryptography-dev mailing list
Cryptography-dev@python.org
https://mail.python.org/mailman/listinfo/cryptography-dev

Reply via email to