...
This noncompliant code example shows an example where ...
| Code Block | ||
|---|---|---|
  | ||
  | ||
Compliant Solution
In this compliant solution, ...
| Code Block | ||||
|---|---|---|---|---|
  |  ||||
Risk Assessment
Using insecure or weak cryptographic algorithms is not a good idea.
Rule  | Severity  | Likelihood  | Detectable  | RepairableRemediation Cost  | Priority  | Level  | 
|---|---|---|---|---|---|---|
MSC25-C  | Medium  | Probable  | No  | HighNo  | P4  | L3  | 
Automated Detection
| Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| CodeSonar | 
  | BADMACRO.WEAK_CRYPTO  | Use of Weak Cryptographic Algorithm Weak Cryptography  | ||||||
| Security Reviewer - Static Reviewer | 
  | CE8  | Fully implemented | 
Related Guidelines
| SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms | 
...