Welcome to mirror list, hosted at ThFree Co, Russian Federation.

05_commonvuln_UseofCryptography.md « webappsec « checklist « content « exampleSite - github.com/vjeantet/hugo-theme-docport.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
blob: 305d081fd73d0bc285fa7c6da6b35ab0fc8d4781 (plain)
1
2
3
4
5
6
7
8
9
10
11
---
hidden: true
---


You previously mentioned that your application uses cryptography to ensure the confidentiality and/or integrity of information. That's great! But we want to make sure you're using cryptography correctly.

Note: when using cryptography, make sure algorithms are used in the right context and within appropriate constraints. For example, encrypting a session ID does not prevent an attacker from manipulating it. Similarly, a signature does not protect a message's confidentiality.

**Describe your use of cryptography (what information is encrypted/signed, how, why, what algorithms are used, etc.). Be as specific and precise as possible:**
{{<c/text "webvuln_crypto_details" multi />}}