[PDF][PDF] Tracing Cryptographic Agility in Android and iOS Apps.

K Heid, J Heider, M Ritscher, JP Stotz - ICISSP, 2023 - scitepress.org
K Heid, J Heider, M Ritscher, JP Stotz
ICISSP, 2023scitepress.org
Cryptography algorithms are applicable in many use cases such as for example encryption,
hashing, signing. Cryptography has been used since centuries, however some cryptography
algorithms have been proven to be easily breakable (under certain configurations or
conditions) and should thus be avoided. It is not easy for a developer with little cryptographic
background to choose secure algorithms and configurations from the plenitude of options.
Several publications already proved the disastrous cryptographic quality in mobile apps in …
Abstract
Cryptography algorithms are applicable in many use cases such as for example encryption, hashing, signing. Cryptography has been used since centuries, however some cryptography algorithms have been proven to be easily breakable (under certain configurations or conditions) and should thus be avoided. It is not easy for a developer with little cryptographic background to choose secure algorithms and configurations from the plenitude of options. Several publications already proved the disastrous cryptographic quality in mobile apps in the past. In this publication we research how cryptography of the top 2000 Android and iOS applications evolved over the past three years. We analyze at the example of the weak AES/ECB mode how and why apps changed from an insecure to a secure configuration and vice versa.
scitepress.org
以上显示的是最相近的搜索结果。 查看全部搜索结果