V3: Cryptography Requirements

Control Objective

Cryptography is an essential ingredient when it comes to protecting data stored on a mobile device. It is also a category where things can go horribly wrong, especially when standard conventions are not followed. The purpose of the controls in this chapter is to ensure that the verified application uses cryptography according to industry best practices, including:

  • Use of proven cryptographic libraries;

  • Proper choice and configuration of cryptographic primitives;

  • A suitable random number generator wherever randomness is required.

Security Verification Requirements

#MSTG-IDDescriptionL1L2

3.1

MSTG-CRYPTO-1

The app does not rely on symmetric cryptography with hardcoded keys as a sole method of encryption.

x

x

3.2

MSTG-CRYPTO-2

The app uses proven implementations of cryptographic primitives.

x

x

3.3

MSTG-CRYPTO-3

The app uses cryptographic primitives that are appropriate for the particular use-case, configured with parameters that adhere to industry best practices.

x

x

3.4

MSTG-CRYPTO-4

The app does not use cryptographic protocols or algorithms that are widely considered deprecated for security purposes.

x

x

3.5

MSTG-CRYPTO-5

The app doesn't re-use the same cryptographic key for multiple purposes.

x

x

3.6

MSTG-CRYPTO-6

All random values are generated using a sufficiently secure random number generator.

x

x

References

The OWASP Mobile Security Testing Guide provides detailed instructions for verifying the requirements listed in this section.

For more information, see also:

Last updated