Skip to content
_CORE
AI & Agentic Systems Core Information Systems Cloud & Platform Engineering Data Platform & Integration Security & Compliance QA, Testing & Observability IoT, Automation & Robotics Mobile & Digital Banking & Finance Insurance Public Administration Defense & Security Healthcare Energy & Utilities Telco & Media Manufacturing Logistics & E-commerce Retail & Loyalty
References Technologies Blog Know-how Tools
About Collaboration Careers
CS EN DE
Let's talk

OWASP Top 10: Cryptographic Failures

28. 03. 2024 Updated: 24. 03. 2026 1 min read intermediate

Formerly known as Sensitive Data Exposure. Poor cryptography leads to leaks of passwords, payment details, and personal data.

Common Mistakes

  • Storing passwords in plaintext or with MD5/SHA1
  • Using HTTP instead of HTTPS
  • Hardcoded encryption keys in code
  • Weak algorithms (DES, RC4, SHA1 for signatures)
  • Insufficient key length (RSA < 2048 bit)

Proper Password Hashing

import bcrypt password = b”tajne_heslo” hashed = bcrypt.hashpw(password, bcrypt.gensalt(rounds=12)) bcrypt.checkpw(password, hashed) # True

OWASP Top 10: Cryptographic Failures

from argon2 import PasswordHasher ph = PasswordHasher(time_cost=3, memory_cost=65536, parallelism=4) hash = ph.hash(“tajne_heslo”) ph.verify(hash, “tajne_heslo”)

Data Encryption — AES-256-GCM

from cryptography.hazmat.primitives.ciphers.aead import AESGCM import os key = os.urandom(32) # 256-bit key nonce = os.urandom(12) aesgcm = AESGCM(key) ct = aesgcm.encrypt(nonce, b”citliva data”, b”aad”) pt = aesgcm.decrypt(nonce, ct, b”aad”)

Checklist

  1. Classify data by sensitivity
  2. Encrypt everything sensitive at rest and in transit
  3. Use AES-256, RSA-2048+, SHA-256+
  4. Hash passwords with Argon2id or bcrypt
  5. Store keys in a key vault (Azure KV, AWS KMS, Vault)
  6. Rotate keys regularly
  7. Enforce HTTPS with HSTS header

Key Takeaway

Encrypt everything sensitive, use modern algorithms, and never store keys in code. Cryptography is a field where ‘almost correct’ means ‘completely wrong’.

owaspsecuritykryptografie
Share:

CORE SYSTEMS team

We build core systems and AI agents that keep operations running. 15 years of experience with enterprise IT.