Cryptography
145. Protect system cryptographic keys336. Disable insecure TLS versions146. Remove cryptographic keys from RAM338. Implement perfect forward secrecy147. Use pre-existent mechanisms346. Use initialization vectors once148. Set minimum size of asymmetric encryption351. Assign unique keys to each device149. Set minimum size of symmetric encryption361. Replace cryptographic keys150. Set minimum size for hash functions370. Use OAEP padding with RSA151. Separate keys for encryption and signatures371. Use GCM Padding with AES223. Uniform distribution in random numbers372. Proper Use of Initialization Vector (IV)224. Use secure cryptographic mechanisms