July 2022
Intermediate to advanced
864 pages
20h 31m
English
Troubleshooting Issues with Cryptographic Implementations
This chapter covers the following topics:
Implementation and Configuration Issues: This section covers validity dates, wrong certificate type, revoked certificates, incorrect name, chain issues including invalid root or intermediate CAs and self-signed certificates, weak signing algorithm, weak cipher suite, incorrect permissions, cipher mismatches, and downgrades.
Keys: This section covers key issues including mismatched keys, improper key handling, embedded keys, rekeying, exposed private keys, crypto shredding, cryptographic obfuscation, key rotation, and compromised keys
This chapter covers CAS-004 Objective 3.7: Given a scenario, troubleshoot issues with cryptographic ...