This rule is a stub.

Noncompliant Code Example

This noncompliant code example shows an example where ...


Compliant Solution

In this compliant solution, ...

Risk Assessment

Using insecure or weak cryptographic algorithms is not a good idea.

Rule

Severity

Likelihood

Remediation Cost

Priority

Level

MSC25-C

Medium

Probable

High

P4

L3

Automated Detection

ToolVersionCheckerDescription
CodeSonar

BADMACRO.WEAK_CRYPTO
BADFUNC.WEAKCRYPTO

Use of Weak Cryptographic Algorithm
Weak Cryptography

Related Guidelines

SEI CERT Oracle Coding Standard for JavaMSC61-J. Do not use insecure or weak cryptographic algorithms

Bibliography