OWASP Top Ten 2021 - A02 Cryptographic Failures

owasp-a02

Cryptographic errors that often lead to the exposure of sensitive data or system compromise, both when storing and transmitting sensitive information. It considers a total of 29 CWEs.

Hash functions are mathematical algorithms that perform a one-way conversion. The result is called a "hash".

Hashing algorithms are a fundamental component for numerous cybersecurity applications; they are used to sign digital certificates, create message authentication codes (MACs), password hashes, and other authentication cases.

OWASP Top 10 Application Security Risks - 2021 Reference
A02:2021 – Cryptographic Failures OWASP

The impact of successful attacks on weak hashing algorithms can be disastrous, limited only by the value of the data and the attacker's imagination in exploiting such data.

Francesco Ongaro

Request more information about this

Or call us at
(+39) 045 4853232


Recent Posts

Visit the blog


Popular Tags


🎉 We want to talk to you! Book an appointment!