Home / Vulnerability Database / Delphi : HMAC using weak hashing algorithm
Delphi

Delphi : HMAC using weak hashing algorithm

Overview

The used hash function in HMAC is insecure. Its use can lead to a data confidentiality loss.

In cryptography, a keyed-hash message authentication code (HMAC) is a specific type of message authentication code (MAC) involving a cryptographic hash function in combination with a secret cryptographic key.

The cryptographic strength of the HMAC depends upon the cryptographic strength of the underlying hash function, the size of its hash output, and on the size and quality of the key.

The MD2, MD5, SHA1 hash functions have known vulnerabilities. Finding collisions for MD2 and MD5 functions do not require substantial resources; a similar problem of finding collisions for SHA1 was also solved.

In order to protect valuable data, use well tested implementations of standard encryption algorithms with sufficiently long keys.

Insufficient Cryptography vulnerabilities take the fifth place in the “OWASP Mobile Top 10 2016” mobile application vulnerabilities ranking.

CRITICAL

DerScanner Severity Score

Do you want to fix Delphi : HMAC using weak hashing algorithm in your application?

See also

Delphi

Delphi : Incorrect Raise call

Delphi

Delphi : Empty encryption key

Delphi

Delphi : Weak random number generator