3. of Tampering
An attacker can take advantage of your custom key exchange or integrity control, which you built instead of using standard crypto:
Threat |
|
You’ve written a hashing algorithm or an encryption algorithm instead of using a known proven algorithm. |
|
CAPEC |
CAPEC-20: Encryption Brute Forcing |
ASVS |
6.2.2: Ensure standard-recognized and tested cryptographic algorithms are being used |
CWE |
CWE-1240: Use of a Cryptographic Primitive with a Risky Implementation |
Mitigations |
|
|