CRYPTOGRAPHY (CR5)

Kyle can bypass cryptographic controls because they do not fail securely (i.e. they default to unprotected)

CRYPTOGRAPHY
5

Kyle can bypass cryptographic controls because they do not fail securely (i.e. they default to unprotected)

OWASP SCP

103,145

OWASP ASVS

1.9.1,6.2.1,9.1.3,9.2.2

OWASP AppSensor

CAPEC

-

SAFECODE

21,29

How to play?

Cryptographic function errors always need to result in rejection. It is also useful to log (associated with the user's identity if possible) and flag these as possibly malicious activity for further analysis, or as input for application intrusion detection systems.

NB: Unlike other cards in this suit, CR 5 assumes that cryptographic functions are in place, however they do not correctly respond to errors.

Mappings

OWASP ASVS (4.0): 1.9.1 ,6.2.1 ,9.1.3 ,9.2.2

Capec:

OWASP SCP: 103,145

OWASP Appsensor:

Safecode: 21,29

ASVS (4.0) Cheatsheetseries Index

ASVS V1.9 - Communications Architectural Requirements

ASVS V6.2 - Algorithms

ASVS V9.1 - Communications Security Requirements

ASVS V9.2 - Server Communications Security Requirements

No suitable mappings were found.

Attacks

Password Guessing/Brute Force Attacks

Insider Threats

Session Hijacking (Man-in-the-Middle)

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.