MASTG - OWASP
Ctrlk
  • πŸ“”Introduction
  • πŸ’ΎTampering and reverse engineering
  • πŸ”’Testing Authentication and Session Management
  • 🌐Testing Network Communication
  • πŸ”‘Testing Cryptography
  • πŸ…Testing Code Quality
  • πŸ™ˆTesting User Privacy Protection
  • πŸ€–Android
  • 🦁Berghem Mobile Testing Guideline
Powered by GitBook
On this page

πŸ”‘Testing Cryptography

Mobile App Cryptography

If there are no tools listed after the heading, the links are just used to gather knowledge and information about the topic.

Key Concepts

Identifying Insecure and/or Deprecated Cryptographic Algorithms

  • keylength.com - Cryptographic Key Length Recommendation

Common Configuration Issues

Insufficient Key Length

  • ENISA Key Size Standard

Symmetric Encryption with Hard-Coded Cryptographic Keys

Weak Key Generation Functions

  • Argon2 - Password hashing function that won the Password Hashing Competition (PHC)

Weak Random Number Generators

Custom Implementation of Cryptography

Inadequate AES Configuration

Padding Oracle Attacks due to Weaker Padding or Block Operation Implementations

Protecting Keys in Storage and in Memory

Protecting Keys in Transport

Cryptographic APIs on Android and iOS

Cryptographic Policy

  • NIST Recommendations for Key Management

Cryptography Regulations

PreviousTesting Network CommunicationNextTesting Code Quality

Last updated 2 years ago

  • Key Concepts
  • Identifying Insecure and/or Deprecated Cryptographic Algorithms
  • Common Configuration Issues
  • Insufficient Key Length
  • Symmetric Encryption with Hard-Coded Cryptographic Keys
  • Weak Key Generation Functions
  • Weak Random Number Generators
  • Custom Implementation of Cryptography
  • Inadequate AES Configuration
  • Padding Oracle Attacks due to Weaker Padding or Block Operation Implementations
  • Protecting Keys in Storage and in Memory
  • Protecting Keys in Transport
  • Cryptographic APIs on Android and iOS
  • Cryptographic Policy
  • Cryptography Regulations