5.1 Security Considerations for Implementers

This protocol uses SHA-1 hashing, which is less secure than other hashing methods.