
These links are no longer relevant since SANS now just link to CWE, and we already have links to CWEs.
39 lines
1020 B
Plaintext
39 lines
1020 B
Plaintext
== Why is this an issue?
|
|
|
|
By contract, the ``++NullCipher++`` class provides an "identity cipher" - one that does not transform or encrypt the plaintext in any way. As a consequence, the ciphertext is identical to the plaintext. So this class should be used for testing, and never in production code.
|
|
|
|
|
|
=== Noncompliant code example
|
|
|
|
[source,java]
|
|
----
|
|
NullCipher nc = new NullCipher();
|
|
----
|
|
|
|
|
|
== Resources
|
|
|
|
* https://owasp.org/www-project-top-ten/2017/A6_2017-Security_Misconfiguration[OWASP Top 10 2017 Category A6] - Security Misconfiguration
|
|
* https://cwe.mitre.org/data/definitions/327[MITRE, CWE-327] - Use of a Broken or Risky Cryptographic Algorithm
|
|
|
|
|
|
ifdef::env-github,rspecator-view[]
|
|
|
|
'''
|
|
== Implementation Specification
|
|
(visible only on this page)
|
|
|
|
=== Message
|
|
|
|
Remove this use of the "NullCipher" class.
|
|
|
|
|
|
'''
|
|
== Comments And Links
|
|
(visible only on this page)
|
|
|
|
=== on 3 Dec 2014, 16:05:08 Nicolas Peru wrote:
|
|
As discussed, detecting call to constructor(s) is sufficient.
|
|
|
|
endif::env-github,rspecator-view[]
|