USING THE WRONG CRYPTOGRAPHY


Please sign in to view the rest of this entry.

USING THE WRONG CRYPTOGRAPHY
1011404USING THE WRONG CRYPTOGRAPHY
<anchor role="natural" id="p2001b4bf9980316"></anchor><emphasis role="bold">OVERVIEW OF THE SIN</emphasis> This chapter covers a multitude of sins that all relate to the way cryptography and cryptographic algorithms are chosen, used, and abused. For some defenses, correct use of the appropriate cryptographic defense leads to an effective defense. But “correct” and “appropriate” are often hard to attain, especially if the designer or developer …
Citation
Michael Howard; David LeBlanc; John Viega: 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. USING THE WRONG CRYPTOGRAPHY, Chapter (McGraw-Hill Professional, 2010), AccessEngineering Export