JSCAPE
  • Products
    • Managed File Transfer
    • JSCAPE SaaS
    • MFT Gateway
    • MFT Monitor
    • All Products
  • Solutions
    • All Solutions
    • Secure File Transfer
    • AS2 Server Software
    • File Synchronization
    • Reverse Proxy
    • Compliance
    • DMZ Streaming
  • Pricing
  • Company
    • Blog
    • Company
    • Contact Us
    • Clients
    • Case Studies
    • Testimonials
    • Certifications
  • Support
    • Help Desk
    • Documentation
    • Customer Downloads
Get a demo

Why SHA2 certificates are imperative in secure file transfers

Words by

John Carl Villanueva

Overview Over the last few months, we’ve been receiving a growing number of inquiries on how to enable support for SHA2 certificates in JSCAPE MFT Server. We later learned that the intention was not just to accommodate SHA2-signed certs but to actually replace SHA1-signed certs with them.In this post, we explain why people are moving…

Published in:

Blog

/

FTPS, Secure File Transfer

Overview

Over the last few months, we’ve been receiving a growing number of inquiries on how to enable support for SHA2 certificates in JSCAPE MFT Server. We later learned that the intention was not just to accommodate SHA2-signed certs but to actually replace SHA1-signed certs with them.In this post, we explain why people are moving from SHA1 to SHA2 and why you need to do so as well.

Why_Its_Time_To_Use_SHA2_Certificates_In_Secure_File_Transfers.jpg

What are SHA-2 Certificates?

SHA2 certificates are digital certificates whose digital signatures were obtained using the SHA2 (Secure Hash Algorithm 2) cryptographic hash function. To review, X.509 certificate signatures are obtained by running the plaintext portion of the digital certificate (consisting of the subject’s name, certificate issuer, validity period, and other information) through a hash function like MD5, SHA1 or SHA2 and then running both the resulting message digest and the CA’s private key through a signing algorithm like RSA or DSA.

If you’re not familiar with the concept of digital signatures and the role cryptographic hash functions play in generating them, I suggest you read the post “What is a Digital Signature?“.

So what about SHA2 certificates? As mentioned, we’ve been seeing a growing number of migrations from SHA1 to SHA2 certificates. This is likely due to the decision of major Web browsers like Chrome, Firefox, and Edge/Internet Explorer to cease support for SHA-1 certificates.

Major browsers are ditchingSHA1

Google announced their intention to gradually drop support for SHA1 in Chrome on September 2014. In their original plan, the goal was to put a complete stop to SHA1 support no later than January 2017. However, what they discovered in recent research was probably not very encouraging because it looks like that January deadline could be moved much earlier.

In fact, the Chrome developers are starting to consider moving it toas early as July this year (2016). As of this writing, that’s just less than 2 months from now.

Chrome isn’t the only major web browser that’s deprecatingSHA1. Microsoft’s browsers, Edge and Internet Explorer, will likewise start blocking SHA1-signed certificates starting February 2017. However, Mozilla, who originally outlined a similar timetable for Firefox, has currently re-enabled support for SHA-1 to evaluate the impact on users who are still employing legacy devices and software. This move is only temporary, as Mozilla has affirmed its commitment to completely remove SHA1 support eventually.

Once these browsers start blocking SHA-1 certificates and you still haven’t migrated to SHA-2, your users will experience problems when they attempt to load web pages through them (i.e. through Chrome, Firefox, and Edge).

But all this leads us to the penultimate question. Why exactly are these browsers ditchingSHA-1? Clearly, it shouldhave something to do with some serious vulnerabilities.

Vulnerabilities in SHA-1 and why we need to address them

One of the main properties that determine whether a hash function can be considered secure and fit for use in a production environment is its collision resistance. A collision refers to the condition wherein two messages produce the same message digest.

Collisions can cause problems because it would mean that it would be possible for an attacker to, for instance,

  1. create an altered version of a document that computes to the same hash as the original,
  2. affix the digital signature of the original, and
  3. present the altered document (with the attached digital signature) as the original.

If that document were the plaintext contents of a digital certificate, then the attacker would have successfully forged a digital certificate.

That explains why, once acryptographic hash function already becomes significantly susceptible tocollisions, it can no longer be considered secure.

There are two main factors that can affectthe probability of collisions. One is the designof the hash function itself.The other is the computational power of existing processors. There was a time when, although theoretically possible, it was practically infeasible to break SHA-1 through collision attacks.

Alas, computers, as they always do, have become more powerful. And so today, it is increasingly becoming nearly 1affordable to overcome SHA1 through collision attacks. That is, organized crime syndicates and nation states who have the financial capability of purchasing powerful computers would be able to carry out collision attacks against SHA1 in the very near future (if they haven’t done so yet).

Because cryptographic hash functions are used in data integrity checks (e.g. in HMAC) and digital signatures, this vulnerability can impact secure file transfers that rely on technologies like SSL, TLS, and SSH.

SHA2 vs SHA256

In spite of what might have been seemingly implied earlier, SHA-2 is actually a not a hash function. Rather, it is a family of hash functions that produce224, 256, 384, or 512-bit hash values (a.k.a. message digests). It currently consists of:

  • SHA-224
  • SHA-256
  • SHA-238
  • SHA-512
  • SHA-512/224
  • SHA-512/256

Of the six, SHA256 is the most widely used.

A sample digital certificatedisplayed in Chrome showing SHA256 as the hash function used

sha256_with_rsa_encryption.png

How to enable SHA2 support JSCAPE MFT Server

In order to enable SHA2 support on JSCAPE MFT Server, you just need to install the latest version and the JCE Unlimited Strength Jurisdiction Policy Files distributed by Oracle. The instructions for installing the required files can be found behind that link.

Get started

Would you like to start transferring files over secure file transfer protocols like FTPS, HTTPS, AS2 over HTTPS, and SFTP? Request a free trial of JSCAPE MFT Server now.

Easy To Deploy, Easy To Administer, Easy To Manage

Ready to see how JSCAPE makes managed file transfer so much simpler? Schedule your demo now.

Request a demo

Popular Articles

View more by

JSCAPE
  •  
    1–2 minutes
    23/09/2025

    JSCAPE by Redwood, version 2025.3: New UI continues to make a splash

    Dive back into JSCAPE by Redwood with version 2025.3, bringing more modern UI updates to make using and navigating JSCAPE more intuitive. 

    Read article

  •  
    1–2 minutes
    19/08/2025

    Weathering the economic storm: Expert support is your enterprise file transfer system’s lifeline

    The global economic landscape can be described by one word: “uncertain”. Lingering effects from the 2020 pandemic, combined with new waves of international tariffs throughout 2025, have…

    Read article

  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    23/07/2025

    Avoid downtime and threat actors: Getting the best of both worlds in MFT

    For enterprise organizations relying on managed file transfer (MFT) solutions, cybersecurity often feels like an arms race. The need to patch MFT software vulnerabilities to prevent breaches…

    Read article

Related Content

Read more about

JSCAPE MFT
  •  
    1–2 minutes
    30/07/2025

    Escape the grip: Why flexible MFT is key to enterprise agility

    Break free from costly vendor lock-in Let’s be blunt: some MFT vendors have built product suites that are less about true partnership and more about proprietary siloing.…

    Read article

  •  
    1–2 minutes
    03/07/2025

    Consolidate, deploy and thrive: JSCAPE’s formula for MFT success in uncertain times

    Global enterprises today are navigating a landscape marked by significant economic volatility. Fluctuating markets, shifting trade policies and persistent economic uncertainty are compelling enterprise organizations to reevaluate…

    Read article

  •  
    1–2 minutes
    31/03/2025

    SFTP vs. FTPS: Which file transfer software is best for business use?

    What is SFTP? SFTP is a file transfer protocol that’s normally packaged with Secure Shell (SSH), the network protocol most IT administrators use to access and manage…

    Read article

  •  
    1–2 minutes
    25/03/2025

    EDI integration with trading partners: 6 best practices

    Many large companies with high-volume transactions, especially those involved in e-commerce, manufacturing and retail supply chains, have long migrated from manual processes to Electronic Data Interchange (EDI).…

    Read article

Company

  • About Us
  • Contact Us
  • Clients
  • Case Studies
  • Testimonials
  • Privacy Policy
  • Certifications

Resources

  • Managed File Transfer
  • Secure File Transfer
  • Secure FTP Server
  • AS2 Server
  • Reverse Proxy
  • File Upload Processing
  • What Is An AS2 Server?

Support

  • Help Desk
  • Documentation
  • Customer Downloads
JSCAPE

Copyright © 2025 JSCAPE

  • Privacy Policy
  • Cookie Settings