Skip to content

Caesar cipher: Issues in current implementation #2

@kobby-pentangeli

Description

@kobby-pentangeli
  1. Parameter Tampering:
  • Depending on how the key parameter is handled in our application, an attacker might manipulate the key input to gain unauthorised access or information.
  1. Side-Channel Attacks:
  • These involve gathering information from the physical implementation of the cipher, such as timing attacks, where an attacker could infer data based on the time it takes to perform encryption or decryption.
  1. Error Handling:
  • If errors or panics are not handled properly in the larger application that uses this library, it might reveal information that can be exploited or used to crash the application.
  1. Code Injection:
  • If user inputs are not validated and sanitized properly in the larger application, it might be possible to execute a code injection attack, though Rust's strong type system generally makes this difficult.

Metadata

Metadata

Assignees

No one assigned

    Labels

    bugSomething isn't workingdocumentationImprovements or additions to documentationenhancementNew feature or requestgood first issueGood for newcomers

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions