Skip to content

Commit 0402d5f

Browse files
committed
Switching locations for link sources.
1 parent 6d2a563 commit 0402d5f

File tree

3 files changed

+4
-4
lines changed

3 files changed

+4
-4
lines changed

tests-beta/ios/MASVS-CRYPTO/MASTG-TEST-0210.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,7 @@ The test case fails if you can find the use of encryption algorithms within the
4343

4444
**Stay up-to-date**: This is a non-exhaustive list of deprecated, risky and broken algorithms. Make sure to check the latest standards and recommendations from organizations such as the National Institute of Standards and Technology (NIST), the German Federal Office for Information Security (BSI) or any other relevant authority in your region.
4545

46-
Some algorithms may not be considered to have insufficient strength, but may have **weak configurations** that should be avoided. Such as using a seed or IV not generated by Cryptographically secure PRNGs (CSPRNG) or not being considered quantum-safe. For example, an AES 128-bit key size is considered insufficient considering quantum computing attacks. When building an app that uses data that will be stored for a considerable long time. Make sure that you follow NIST recommendations about how to ["Transition to Post-Quantum Cryptography Standards"](https://csrc.nist.gov/pubs/ir/8547/ipd).
46+
Some algorithms may not be considered to have insufficient strength, but may have **inappropriate configurations** that should be avoided. Such as using a seed or IV not generated by Cryptographically secure PRNGs (CSPRNG) or not being considered quantum-safe. For example, an AES 128-bit key size is considered insufficient considering quantum computing attacks. When building an app that uses data that will be stored for a considerable long time. Make sure that you follow NIST recommendations about how to ["Transition to Post-Quantum Cryptography Standards"](https://csrc.nist.gov/pubs/ir/8547/ipd).
4747

4848
**Context Considerations**:
4949

tests-beta/ios/MASVS-CRYPTO/MASTG-TEST-0211.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ weakness: MASWE-0021
1010

1111
To test for the use of risky or broken hashing algorithms in iOS apps, we need to focus on methods from cryptographic frameworks and libraries that are used to perform hashing operations.
1212

13-
- **CommonCrypto**: [CommonDigest.h](https://opensource.apple.com/source/CommonCrypto/CommonCrypto-36064/CommonCrypto/CommonDigest.h) defines the following **hashing algorithms**:
13+
- **CommonCrypto**: [CommonDigest.h](https://web.archive.org/web/20240606000312/https://opensource.apple.com/source/CommonCrypto/CommonCrypto-36064/CommonCrypto/CommonDigest.h) defines the following **hashing algorithms**:
1414
- `CC_MD2`
1515
- `CC_MD4`
1616
- `CC_MD5`
@@ -44,7 +44,7 @@ The test case fails if you can find the use of "broken" hashing algorithms withi
4444
- MD5
4545
- SHA-1
4646

47-
**Stay up-to-date**: This is a non-exhaustive list of weak, risky or broken algorithms. Make sure to check the latest standards and recommendations from organizations such as the National Institute of Standards and Technology (NIST), the German Federal Office for Information Security (BSI) or any other relevant authority in your region. When building an app that uses hashes that will be stored for a considerable long time. Make sure that you follow NIST recommendations about how to ["Transition to Post-Quantum Cryptography Standards"](https://csrc.nist.gov/pubs/ir/8547/ipd).
47+
**Stay up-to-date**: This is a non-exhaustive list of weak, risky or broken algorithms. Make sure to check the latest standards and recommendations from organizations such as the National Institute of Standards and Technology (NIST), the German Federal Office for Information Security (BSI) or any other relevant authority in your region. When building an app that uses hashes that will be stored for a considerable long time. Make sure that you follow NIST recommendations about how to ["Transition to Post-Quantum Cryptography Standards"](https://csrc.nist.gov/pubs/ir/8547/ipd).
4848

4949
**Context Considerations**:
5050

weaknesses/MASVS-CRYPTO/MASWE-0019.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ mappings:
1212

1313
refs:
1414
- https://book.hacktricks.xyz/crypto-and-stego/cryptographic-algorithms
15-
- https://dl.acm.org/doi/10.4108/eai.3-12-2015.2262471
15+
- https://eudl.eu/pdf/10.4108/eai.3-12-2015.2262471
1616
- https://www.scitepress.org/papers/2014/50563/50563.pdf
1717
- https://pure.tugraz.at/ws/portalfiles/portal/23858147/main.pdf
1818
- https://github.com/Wind-River/crypto-detector

0 commit comments

Comments
 (0)