Cryptographic Failures – What is it? (2024)

In the second entry of this ten-part blog series, we will be taking a look at A02:2021: Cryptographic Failures. This, the second entry in OWASP’s Top Ten list is described as more of a broad symptom rather than a root cause of vulnerability and specifically points to failures that occur owing to a lack of appropriate cryptography. Such a lack can often lead to the unauthorised exposure of data, sensitive or otherwise.

An example of insufficient cryptographic functions leading to a failure could be a web application hosted by an entity that does not enforce the use of a secure protocol such as HTTPS. If, instead, a user is allowed to submit their data over a connection using the HTTP protocol, their data is sent to the server in clear-text. This data can be captured by an attacker who has placed themselves between the victim and the intended destination, allowing the attacker access to that user’s credentials.

Several areas of risk that can be attributed to cryptographic failures include:

·The use of any outdated algorithms or weak keys.

· Storing sensitive data (such as passwords) but not encrypting the data in the first place (hashing, salting etc.).

·Insecure or inadequate management of important cryptographic keys.

·The lack of Data-in-Transit Encryption in a site, such as allowing information to be sent over a HTTP connection as described above.

·The use of FTP (File Transfer Protocol) in a system inadequately storing data, allowing for the plain-text transfer of any files located on that system.

Preventing Cryptographic Failures

When attempting to prevent instances of cryptographic failure, it is helpful to implement the following best practices:

·Ensure that any access tokens and keys are stored securely and only accessible by those authorised to do so. Additionally, rotate keys periodically and revoke their permissions when they are no longer necessary.

·Ensure the use of up-to-date, supported algorithms for encryption, such as AES over MD5 and RSA/DSA or ECC for keys.

·Ensure that data is transported securely, for example using SFTP over FTP and HTTPS over HTTP.

·Store passwords using strong, salted hashing functions, such as Argon2 or bcrypt.

·Always use authenticated encryption over just encryption where possible.

·Never store sensitive data if it is not necessary to do so. It is better to discard the data than store it indefinitely, as accessing destroyed data is even harder than accessing strongly encrypted data.

It is very important to ensure strong cryptographic controls are in place when handling data on a web application. Doing so ensures that both clients and organisations are doing their level best to keep data safe and secure from unauthorised attempts to steal this data and use it for their own purposes.

When conducting penetration tests against a client’s web application, the team at CyberWhite follow the OWASP framework closely. This allows us to check applications against the OWASP Top Ten list, including Cryptographic Failures as explored in this blog post.

Cryptographic Failures – What is it? (2024)
Top Articles
15 Highest-Grossing Television Shows of All Time
Tesla shares plummet after company reports falling profits
Use Copilot in Microsoft Teams meetings
Ron Martin Realty Cam
NYT Mini Crossword today: puzzle answers for Tuesday, September 17 | Digital Trends
Comforting Nectar Bee Swarm
Dr Doe's Chemistry Quiz Answer Key
Puretalkusa.com/Amac
Toyota gebraucht kaufen in tacoma_ - AutoScout24
Costco in Hawthorne (14501 Hindry Ave)
Wmlink/Sspr
Scentsy Dashboard Log In
Osrs Blessed Axe
Chastity Brainwash
Oxford House Peoria Il
Classroom 6x: A Game Changer In The Educational Landscape
Nwi Arrests Lake County
Dc Gas Login
Lazarillo De Tormes Summary and Study Guide | SuperSummary
Universal Stone Llc - Slab Warehouse & Fabrication
Aerocareusa Hmebillpay Com
Stoney's Pizza & Gaming Parlor Danville Menu
Busted News Bowie County
Www.craigslist.com Savannah Ga
How to Watch Every NFL Football Game on a Streaming Service
Mythical Escapee Of Crete
Idle Skilling Ascension
Dmv In Anoka
Preggophili
Gillette Craigslist
Lbrands Login Aces
Bfsfcu Truecar
Keshi with Mac Ayres and Starfall (Rescheduled from 11/1/2024) (POSTPONED) Tickets Thu, Nov 1, 2029 8:00 pm at Pechanga Arena - San Diego in San Diego, CA
The Creator Showtimes Near Baxter Avenue Theatres
Kamzz Llc
Parent Management Training (PMT) Worksheet | HappierTHERAPY
Jeep Cherokee For Sale By Owner Craigslist
Poster & 1600 Autocollants créatifs | Activité facile et ludique | Poppik Stickers
Sedano's Supermarkets Expands to Orlando - Sedano's Supermarkets
Sephora Planet Hollywood
Streameast.xy2
Craigslist Putnam Valley Ny
Emulating Web Browser in a Dedicated Intermediary Box
Emily Browning Fansite
Centimeters to Feet conversion: cm to ft calculator
Trending mods at Kenshi Nexus
The Average Amount of Calories in a Poke Bowl | Grubby's Poke
Aloha Kitchen Florence Menu
Vcuapi
Palmyra Authentic Mediterranean Cuisine مطعم أبو سمرة
Asisn Massage Near Me
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 5624

Rating: 4.3 / 5 (64 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.