Applications in general should avoid , and securityuse of insecure or weak cryptographic primitives. Security-related applications must avoid , use of insecure or weak cryptographic primitives. The computational capacity of modern computers permits circumvent circumvention of such cryptography via brute-force attacks. For example, the DES encryption algorithm is considered highly insecure; messages encrypted using DES have been decrypted by brute force within a single day by machines such as the Electronic Frontier Foundation's (EFF) Deep Crack.
...
Bibliography
Wiki Markup |
---|
\[java:[API 2006|AA. Bibliography#API 06]\] \[java:[MITRE 2009|AA. Bibliography#MITRE 09]\] [CWE ID 327|http://cwe.mitre.org/data/definitions/327.html] "Use of a Broken or Risky Cryptographic Algorithm" |
...