MASTG - OWASP
search
⌘Ctrlk
MASTG - OWASP
  • πŸ“”Introduction
  • πŸ’ΎTampering and reverse engineering
  • πŸ”’Testing Authentication and Session Management
  • 🌐Testing Network Communication
  • πŸ”‘Testing Cryptography
  • πŸ…Testing Code Quality
  • πŸ™ˆTesting User Privacy Protection
  • πŸ€–Android
  • 🦁Berghem Mobile Testing Guideline
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

πŸ”‘Testing Cryptography

Mobile App Cryptography

triangle-exclamation

If there are no tools listed after the heading, the links are just used to gather knowledge and information about the topic.

hashtag
Key Conceptsarrow-up-right

hashtag
Identifying Insecure and/or Deprecated Cryptographic Algorithmsarrow-up-right

  • keylength.comarrow-up-right - Cryptographic Key Length Recommendation

hashtag
Common Configuration Issuesarrow-up-right

hashtag
Insufficient Key Lengtharrow-up-right

  • ENISA Key Size Standardarrow-up-right

hashtag
Symmetric Encryption with Hard-Coded Cryptographic Keysarrow-up-right

hashtag
Weak Key Generation Functionsarrow-up-right

  • Argon2arrow-up-right - Password hashing function that won the Password Hashing Competition (PHC)

hashtag
Weak Random Number Generatorsarrow-up-right

hashtag
Custom Implementation of Cryptographyarrow-up-right

hashtag
Inadequate AES Configurationarrow-up-right

hashtag
Padding Oracle Attacks due to Weaker Padding or Block Operation Implementationsarrow-up-right

hashtag
Protecting Keys in Storage and in Memoryarrow-up-right

hashtag
Protecting Keys in Transportarrow-up-right

hashtag
Cryptographic APIs on Android and iOSarrow-up-right

hashtag
Cryptographic Policyarrow-up-right

  • NIST Recommendations for Key Managementarrow-up-right

hashtag
Cryptography Regulationsarrow-up-right

hashtag

PreviousTesting Network Communicationchevron-leftNextTesting Code Qualitychevron-right

Last updated 3 years ago

  • Key Concepts
  • Identifying Insecure and/or Deprecated Cryptographic Algorithms
  • Common Configuration Issues
  • Insufficient Key Length
  • Symmetric Encryption with Hard-Coded Cryptographic Keys
  • Weak Key Generation Functions
  • Weak Random Number Generators
  • Custom Implementation of Cryptography
  • Inadequate AES Configuration
  • Padding Oracle Attacks due to Weaker Padding or Block Operation Implementations
  • Protecting Keys in Storage and in Memory
  • Protecting Keys in Transport
  • Cryptographic APIs on Android and iOS
  • Cryptographic Policy
  • Cryptography Regulations