Cryptographic software: vulnerabilities in implementations

Michał Łuczaj


Security and cryptographic applications or libraries, just as any other generic software products may be affected by flaws introduced during the implementation process. No matter how much scrutiny security protocols have undergone, it is — as always — the weakest link that holds everything together to makes products secure. In this paper I take a closer look at problems usually resulting from a simple human made mistakes, misunderstanding of algorithm details or a plain lack of experience with tools and environment. In other words: everything that can and will happen during software development but in the fragile context of cryptography
Author Michał Łuczaj IT
Michał Łuczaj,,
- The Institute of Telecommunications
Journal seriesAnnales UMCS Informatica, Sectio AI, ISSN 1732-1360
Issue year2011
Languageen angielski
Luczaj.pdf (file archived - login or check accessibility on faculty) Luczaj.pdf 125.25 KB
Score (nominal)5
Citation count*0 (2013-01-30)
Share Share

* presented citation count is obtained through Internet information analysis and it is close to the number calculated by the Publish or Perish system.