SHA-2 Compliance
As part of a security improvement, organizations are transitioning from the SHA-1 hashing algorithm to a SHA-2 (usually SHA-256) hashing algorithm. This change is usually driven by compliance requirements:
-
NIST SP 800-78 requires that the content of a PIV card (digital certificates, CHUID, biometric information) is signed with the SHA-256 hashing algorithm.
-
NIST SP 800-131 provides guidance specifying that SHA-2 (SHA-224, SHA-256, SHA-384 or SHA-512) should be used as a hashing algorithm for digital signature generation and verification (SHA-1 remains acceptable for non-digital signature generation operations).
This change has a big impact on many applications. This section describes the impact of these changes on ActivClient and various applications. Support for SHA-2 for other use cases (non-digital signature operations) is not covered in this section.
Card Content Signed with SHA-2
ActivClient supports smart cards whose content (digital certificates, CHUID, biometric information) is signed with a SHA-2 hashing algorithm.
This change might have an impact on some applications, as indicated in the table below.
This change might have an impact on some applications, as indicated in the table below.
Service | Product and versions | Notes |
---|---|---|
Windows PKI Logon |
|
|
Remote access | Windows & Citrix | |
Secure web access |
Check with your vendor for other web servers |
|
Secure email |
Supported applications:
|
Email signature is configured for SHA-256. See next section for SHA-2 configuration. |
Document signing |
Supported applications:
|
Document signature is configured for SHA-256. See next section for SHA-2 configuration |
Document encryption |
Supported applications:
|
Using SHA-2 for Digital Signature Operations
ActivClient includes several middleware libraries that enable applications to use SHA-2 for digital signature operations:
-
A Mini Driver, required to support SHA-2 for digital signature operations with the latest Microsoft applications.
-
A PKCS#11 library v2.2, this latest version is required to support SHA-2.
The fact that ActivClient middleware exposes some SHA-2 services to applications is usually not enough. Applications usually have to be updated as well in order to support SHA-2, as software vendors have started supporting this algorithm very recently. The table below provides information available by HID Global at the time of publication. It is recommended that you check with your software provider for the latest compatibility information.
Service | Product and versions | Notes |
---|---|---|
Email signature |
Supported applications:
|
Outlook information:
Outlook Web Access information:
|
Document signature |
Supported applications:
|
Office information:
Acrobat information: Requires a specific policy configuration. See details at http://learn.adobe.com/wiki/download/attachments/52658564/acrobat_reader_security_9x.pdf?version=1 (pages 16 and 124). |