CRYPTOGRAPHY (CRK)

Dan can influence or alter cryptography code/routines (encryption, hashing, digital signatures, random number and GUID generation) and can therefore bypass them

CRYPTOGRAPHY
K

Dan can influence or alter cryptography code/routines (encryption, hashing, digital signatures, random number and GUID generation) and can therefore bypass them

OWASP SCP

31,101

OWASP ASVS

1.6.2,6.2.5,6.2.6,6.2.7,6.2.8

OWASP AppSensor

CAPEC

-

SAFECODE

14,21,29

How to play?

In general, all cryptographic routines should be on the server-side using robust, tested and protected routines.

NB: Unlike other cards in this suit, this CR K relates to an attacker being able to change the executing code. This may be due to inadequate source code control, deployment controls or server protection, but could also be modification of client-side code.

Mappings

OWASP ASVS (4.0): 1.6.2 ,6.2.5 ,6.2.6 ,6.2.7 ,6.2.8

Capec: 207 ,554

OWASP SCP: 31,101

OWASP Appsensor:

Safecode: 14,21,29

ASVS (4.0) Cheatsheetseries Index

ASVS V1.6 - Cryptographic Architectural Requirements

ASVS V6.2 - Algorithms

No suitable mappings were found.

Attacks

Weakening Encryption

Manipulation of Hash Functions

OWASP Cornucopia

  • OWASP Cornucopia is a mechanism in the form of a card game to assist software development teams identify security requirements in Agile, conventional and formal development processes. It is language, platform and technology-agnostic, and is free to use.
  • OWASP Cornucopia is licensed under the Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar licence to this one.
  • © 2012-2025 OWASP Foundation. The Open Worldwide Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.