Move Labs
Explore 1 lab in Move.
This vulnerability arises when a system uses cryptographic algorithms that are known to be weak, deprecated, or implemented in a risky manner. Examples include the use of outdated algorithms such as MD5, SHA-1, or DES, the use of weak key sizes (e.g., 1024-bit RSA, AES-128 in high-security contexts), or custom “home-rolled” cryptographic constructions. Attackers can exploit these weaknesses to recover plaintext, forge signatures, create hash collisions, or bypass integrity and authenticity guarantees. In blockchain and Web3 systems, this can translate to stolen private keys, forged transactions, or contract takeover.
** Use SHA-256, SHA-3, or BLAKE2 for hashing. ** Use AES-256-GCM or ChaCha20-Poly1305 for encryption and authentication. ** Use at least 2048-bit RSA, or preferably elliptic curve cryptography (e.g., secp256k1, Ed25519).
Select a language to explore available labs for this vulnerability.
Try adjusting your language filter.
Want to skill-up in secure coding and AppSec? Try SecDim Wargames to learn how to find, hack and fix security vulnerabilities inspired by real-world incidents.
Join our secure coding and AppSec community. A discussion board to share and discuss all aspects of secure programming, AppSec, DevSecOps, fuzzing, cloudsec, AIsec code review, and more.
Read more