This rule is a stub.
This noncompliant code example shows an example where ...
In this compliant solution, ...
Using insecure or weak cryptographic algorithms is not a good idea.
| Rule | Severity | Likelihood | Remediation Cost | Priority | Level | 
|---|---|---|---|---|---|
| MSC25-C | Medium | Probable | High | P4 | L3 | 
| Tool | Version | Checker | Description | 
|---|
| SEI CERT Oracle Coding Standard for Java | MSC61-J. Do not use insecure or weak cryptographic algorithms |