Cryptographic software: vulnerabilities in implementations

Michał Łuczaj

Abstract


Security and cryptographic applications or libraries, just as any other generic software products may be affected by flaws introduced during the implementation process. No matter how much scrutiny security protocols have undergone, it is — as always — the weakest link that holds everything together to makes products secure. In this paper I take a closer look at problems usually resulting from a simple human made mistakes, misunderstanding of algorithm details or a plain lack of experience with tools and environment. In other words: everything that can and will happen during software development but in the fragile context of cryptography

Full Text:

PDF


DOI: http://dx.doi.org/10.2478/v10065-011-0030-7
Date of publication: 2011-01-01 00:00:00
Date of submission: 2016-04-28 09:04:52


Statistics


Total abstract view - 271
Downloads (from 2020-06-17) - PDF - 0

Indicators



Refbacks

  • There are currently no refbacks.


Copyright (c) 2015 Annales UMCS Sectio AI Informatica

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.