Evaluating Cryptographic Solutions
Within most areas of application security there is a broad range of threat actors who have the capability to exploit vulnerabilities in an application. With cryptography though, as long as the appropriate algorithms are used for their intended purpose and implemented correctly, the range of threat actors is reduced to only well-resourced attackers (typically nation-states).
Read full post