T-SQL : Weak encryption algorithm
Classification
Overview
The application uses a weak encryption algorithm.
Obsolete encryption algorithms do not provide sufficient protection for applications that work with valuable data. Security of a cryptographic algorithm is determined by the estimated expense of time and resources required to get access to the encrypted data. Constant development of new attacks and increase in hardware performance make previously considered safe algorithms obsolete. For example, DES because of the small key length (56 bits) can be cracked by an exhaustive search.
In order to protect valuable data, use well tested implementations of standard encryption algorithms with sufficiently long keys.
Sensitive Data Exposure vulnerabilities take the third place in the “OWASP Top 10 2017” web-application vulnerabilities ranking.
