🔐
DevSec
💻 GitHub
  • 👋Welcome
    • DevSec
    • Glossary
    • Contributing
    • Discussions
  • 📖Resources
    • Articles
    • Books
    • Communities
    • Institutions
    • Conferences
    • Sites
    • Podcasts
    • Training
    • Other
  • ⚒️Tools
    • Static Analysis
    • Dynamic Analysis
    • Vulnerabilities Analysis
    • Dependency Management
    • Supply Chain
    • Secrets
      • Secrets Management
      • Secrets Scanning
    • Infrastructure as Code (IaC)
    • Other
  • 🔧Generic Development
    • Security Basics
    • Containers
    • Git & other VCS
    • Cryptography
  • ☁️Web Development
    • Generic
    • APIs
  • ☁️Cloud
    • Cloud native
    • Kubernetes
  • 😈On the other side
    • Red team
Powered by GitBook
On this page
  • About
  • Best practices
  • Resources
  • Tools
  • Sources

Was this helpful?

Edit on GitHub
  1. Generic Development

Cryptography

Cryptography is hard, difficult, but we must know about its importance

PreviousGit & other VCSNextGeneric

Last updated 1 year ago

Was this helpful?

About

Cryptography is the process of hiding or coding information so that only the person a message was intended for can read it. Cryptography remains important to protecting data and users, ensuring confidentiality, and preventing cyber criminals from intercepting sensitive corporate information. [2]

Cryptographic keys are a foundational element of modern cybersecurity. They serve to keep data safely encrypted and help maintain secure networks for client-server communication. Unfortunately, this makes them a prime target for hackers. A single compromised key can give access to a goldmine of personal data and valuable IP, as well as enable other malicious actions such as unauthorized system access or signing digital certificates. Yet, despite its importance, many software developers still do not prioritize cryptographic key protection. [3]

Best practices

Here are some best practices to follow regarding Cryptography and Cryptographic keys [1][2][3][4]:

Resources

Tools

Sources

[1]:

[2]:

[3]:

[4]:

🔧
Argon2
scrypt
bcrypt
PBKDF2
more info
source
more info
MD5
SHA1
PKCS number 1
more info
more info
more info
more info
more info
more info
key management
Secrets management
more info
more info
more info
more info
more info
more info
white-box cryptography
A02 Cryptographic Failures - OWASP Top 10:2021
OWASP Proactive Controls: Protect Data Everywhere
OWASP Application Security Verification Standard (V7, 9, 10)
OWASP Cheat Sheet: Transport Layer Protection
OWASP Cheat Sheet: User Privacy Protection
OWASP Cheat Sheet: Password Storage
OWASP Cheat Sheet: Cryptographic Storage
OWASP Cheat Sheet: Key management
OWASP Cheat Sheet: HSTS
OWASP Testing Guide: Testing for weak cryptography
The Definitive Guide to Encryption Key Management Fundamentals (townsendsecurity.com)
Practical Cryptography for Developers (nakov.com)
OWASP Testing Guide: Testing for weak cryptography
Cryptography | NIST
What is Cryptography? Definition, Importance, Types | Fortinet
Five cryptographic key protection best practices - Security Boulevard
Key Management - OWASP Cheat Sheet Series