logo

Database

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

Home

Vulnerabilities

Weaknesses

Fixes

Requirements

Architecture

Authentication

Authorization

Certificates

Credentials

Cryptography

Data

Devices

Emails

Files

Legal

Logs

Networks

Privacy

Services

Session

Social

Source

System

Virtualization

Standards

Rules


Documentation

Help

Log in to the platform

Website

Data sources

  1. /

  2. Home
  3. /

  4. Requirements
  5. /

  6. Cryptography

Cryptography

145. Protect system cryptographic keys223. Uniform distribution in random numbers146. Remove cryptographic keys from RAM224. Use secure cryptographic mechanisms147. Use pre-existent mechanisms336. Disable insecure TLS versions148. Set minimum size of asymmetric encryption338. Implement perfect forward secrecy149. Set minimum size of symmetric encryption346. Use initialization vectors once150. Set minimum size for hash functions371. Use GCM Padding with AES151. Separate keys for encryption and signatures