Current location - Quotes Website - Personality signature - What if your signature device does not support the required hash algorithm sha256 during signature authentication?
What if your signature device does not support the required hash algorithm sha256 during signature authentication?
The algorithm used for certificate signing is specified by the publisher to encrypt the hash value encoded by the certificate with his own private key. The general algorithm is md5withrsa or sha256withrsa.

The hash algorithm is unique, that is, the certificate code is converted into fixed-length binary, which is irreversible, that is, the certificate code cannot be restored by hash value.

If not, you can consider changing it.

SHA stands for secure hash algorithm. SHA- 1 and SHA-2 are two different versions of this algorithm with different structures and signature lengths, but SHA-2 can be understood as the successor of SHA- 1.

Extended data:

Certificate file format:

1, csr, the request file format used to apply for signature from CA.

2, cer or crt, public key certificate, uncertain encoding method, mostly used in Windows.

3. The encoding method of key, public key or private key is uncertain.

4, pem, public key or private key or public key and private key, BASE64 encoding format, mostly used in Linux.

5, pfx, including public key and private key, DER encoding binary format, mostly used in Windows.