ASVS Requirement 11.6.1
- Level: 2
- Chapter: V11 Cryptography
- Section: V11.6 Public Key Cryptography
- Source: 0x20-V11-Cryptography.md
Description
Verify that only approved cryptographic algorithms and modes of operation are used for key generation and seeding, and digital signature generation and verification. Key generation algorithms must not generate insecure keys vulnerable to known attacks, for example, RSA keys which are vulnerable to Fermat factorization.