Cryptographic errors that often lead to the exposure of sensitive data or system compromise, both when storing and transmitting sensitive information. It considers a total of 29 CWEs.
Hash functions are mathematical algorithms that perform a one-way conversion. The result is called a "hash".
Hashing algorithms are a fundamental component for numerous cybersecurity applications; they are used to sign digital certificates, create message authentication codes (MACs), password hashes, and other authentication cases.
OWASP Top 10 Application Security Risks - 2021 | Reference |
---|---|
A02:2021 – Cryptographic Failures | OWASP |
The impact of successful attacks on weak hashing algorithms can be disastrous, limited only by the value of the data and the attacker's imagination in exploiting such data.
Francesco Ongaro