Weak Encryption Algorithms
Description
Using deprecated ciphers (DES/3DES/RC4) or insecure modes (AES‑ECB) exposes data to recovery via brute force or structural analysis. Custom crypto wrappers often mishandle IVs/nonces and omit authentication, enabling forgery.
Examples
Identify Insecure Modes in Code
jadx -r -d out app-release.apk
rg -n "AES/ECB|DES|RC4|NoPadding|getInstance\(" out
If code uses Cipher.getInstance("AES/ECB/PKCS5Padding"), patterns are vulnerable to block rearrangement and leakage.
Downgrade to Legacy Suites (Server)
Detect acceptance of weak TLS ciphers:
openssl s_client -connect api.example.com:443 -tls1_0 -cipher RC4-SHA
Successful handshakes indicate legacy support.
Remediation
- Use modern AEAD
- Prefer AES‑GCM or ChaCha20‑Poly1305 via platform crypto APIs; include authentication.
- Implement crypto agility
- Version payloads and rotate keys; deprecate weak algorithms without breaking older clients.
- Enforce strong TLS
- Disable legacy protocol versions and cipher suites; monitor for deprecated usage in telemetry and code reviews.