The Challenge of Cryptographic Visibility
Modern software applications rarely implement cryptography from scratch. Instead, they rely on numerous open-source libraries and dependencies that may contain many different cryptographic implementations. These implementations are often:- Hidden in transitive dependencies: Direct dependencies may themselves depend on libraries that implement cryptography you are unaware of.
- Version-dependent: A specific package version may contain weak cryptography that was addressed in later releases.
- Undocumented: Many libraries use cryptography internally without declaring which algorithms or key sizes they employ.
- Not quantum-safe: Most existing cryptographic implementations rely on algorithms such as RSA and ECC that are expected to become vulnerable as quantum computing capabilities advance.