Skip to content

Commit

Permalink
Remove duplicate req to resolve #2402 (#2404)
Browse files Browse the repository at this point in the history
* Fix for #2402

* Since it was added, no tag is needed :)

---------

Co-authored-by: Josh Grossman <[email protected]>
  • Loading branch information
danielcuthbert and tghosth authored Nov 22, 2024
1 parent 278397d commit 8f819c4
Showing 1 changed file with 0 additions and 1 deletion.
1 change: 0 additions & 1 deletion 5.0/en/0x14-V6-Cryptography.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,6 @@ Cryptographic hashes are used in a wide variety of cryptographic protocols, such
| **6.6.2** | [MODIFIED, MOVED FROM 2.4.1, MERGED FROM 2.4.3, 2.4.4] Verify that passwords are stored using an approved, computationally intensive, hashing algorithm with parameter settings configured based on current guidance. The settings should balance security and performance to make brute-force attacks more challenging. | ||| |
| **6.6.3** | [ADDED, SPLIT FROM 6.2.5] Verify that cryptographic systems avoid the use of disallowed hash functions, such as MD5, SHA-1, or any other insecure hash functions, for any cryptographic purpose. |||| |
| **6.6.4** | [ADDED] Verify that hash functions used in digital signatures are collision resistant and have appropriate bit-lengths to avoid attacks, such as collision or pre-image attacks. |||| |
| **6.6.5** | [ADDED] Verify that suitable hash functions are used in HMACs, KDFs, and random bit generation. | ||| |

## V6.7 Key Exchange Mechanisms

Expand Down

0 comments on commit 8f819c4

Please sign in to comment.