hashing, signing. Cryptography has been used since centuries, however some cryptography
algorithms have been proven to be easily breakable (under certain configurations or
conditions) and should thus be avoided. It is not easy for a developer with little cryptographic
background to choose secure algorithms and configurations from the plenitude of options.
Several publications already proved the disastrous cryptographic quality in mobile apps in …