{"id":42426,"date":"2020-07-29T17:56:11","date_gmt":"2020-07-29T21:56:11","guid":{"rendered":"https:\/\/www.opensource.im\/uncategorized\/cryptography-based-vulnerabilities-in-applications-security-boulevard.php"},"modified":"2020-07-29T17:56:11","modified_gmt":"2020-07-29T21:56:11","slug":"cryptography-based-vulnerabilities-in-applications-security-boulevard","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/cryptography-based-vulnerabilities-in-applications-security-boulevard.php","title":{"rendered":"Cryptography-based Vulnerabilities in Applications &#8211; Security Boulevard"},"content":{"rendered":"<p><p>Introduction to cryptography<\/p>\n<p>Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. By using an encryption algorithm, it is possible to transform data in a way that makes it impossible to read by anyone lacking knowledge of the secret key. Both hash functions and digital signatures can provide integrity protection, and a digital signature verifies the authenticity of a message as well.<\/p>\n<p>However, these benefits of cryptographic algorithms only apply if the algorithms are used correctly. Cryptographic algorithms are very delicate, and a single mistake in design or implementation can render their protections meaningless.<\/p>\n<p>Cryptography can go wrong in a number of different ways. Some of the most common mistakes are trying to use insecure or custom algorithms, using algorithms with known weaknesses and misusing cryptography entirely.<\/p>\n<p>It seems that using a custom and secret encryption algorithm would protect data confidentiality better than a known one. If no one knows how an algorithm works, then it should be harder for someone to break it.<\/p>\n<p>The problem with this theory is that most people are not trained cryptographers, and even trained cryptographers make mistakes when developing cryptographic algorithms. For every well-known and trusted encryption algorithm in use today, there are others that seemed like a good idea at the time but carried fatal weaknesses.<\/p>\n<p>Take the Advanced Encryption Standard (AES), for example. The National Institute of Standards and Technology (NIST) put on a multi-year contest to select the AES. In August 1998, fifteen candidate algorithms were chosen from those submitted. Within a year, major vulnerabilities were discovered within five of the algorithms and another four had less-serious attacks.<\/p>\n<p>These were algorithms developed by experienced cryptographers with knowledge of common cryptanalytic techniques, yet many were rapidly broken. Dont try to create  (Read more...)<\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/securityboulevard.com\/2020\/07\/cryptography-based-vulnerabilities-in-applications\/\" title=\"Cryptography-based Vulnerabilities in Applications - Security Boulevard\" rel=\"noopener noreferrer\">Cryptography-based Vulnerabilities in Applications - Security Boulevard<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Introduction to cryptography Cryptography is designed to help protect the confidentiality, integrity and authenticity of data. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-42426","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/42426"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=42426"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/42426\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=42426"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=42426"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=42426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}