...
This noncompliant code example shows an example where ...
| Code Block | ||
|---|---|---|
| ||
| ||
Compliant Solution
In this compliant solution, ...
| Code Block | ||
|---|---|---|
| ||
| ||
Risk Assessment
Using insecure or weak cryptographic algorithms is not a good idea.
Rule | Severity | Likelihood | Detectable | RepairableRemediation Cost | Priority | Level |
|---|---|---|---|---|---|---|
MSC25-C | Medium | Probable | No | NoHigh | P4 | L3 |
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar |
| BADMACRO.WEAK_CRYPTO | Use of Weak Cryptographic Algorithm Weak Cryptography | ||||||
| Security Reviewer - Static Reviewer |
| CE8 | Fully implemented |
Related Guidelines
| SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms |