Cryptography techniques are used in secure communication protocols such
as HTTPS web pages, VPN and SSH. Cryptography is implemented to
ensure data confidentiality and integrity. Bad actors and adversaries can
break cryptography due to poor crypto design and weak links in its
implementation.
Cryptography evaluation includes the analysis of crypto protocols,
algorithms, cipher strength and its implementation. We identify weak
points in the symmetric and asymmetric ciphers, random number
generators, password storage and sensitive data storage mechanisms,
hashing and cryptographic key management system (CKMS).