Module 2

Secure Software Development (Computer Science)

Unit 8

Cryptography and Its Use in Operating Systems

Learning Outcomes

  • Describe some of the issues encountered with cryptographic libraries.
  • Explain the pros and cons of using common cryptographic libraries.
  • Demonstrate the use of cryptographic libraries in a simple application.

e-Portfolio Component: Collaborative Discussion 2: Cryptography case study - TrueCrypt

  • A discussion was started answering the below questions. Furthermore, an ontology design capturing the weaknesses of TrueCrypt according to their severity was presented. Questions:
    1. The (anonymous) TrueCrypt authors have said “Using TrueCrypt is not secure as it may contain unfixed security issues” (TrueCrypt, 2014). Does the cryptanalysis provided above prove or disprove this assumption?
    2. Would you be prepared to recommend TrueCrypt to a friend as a secure storage environment? What caveats (if any) would you add?
  • Link to the discussion forum's post: here

Reflection

  • Unit 8 was relatively less demanding. The collaborative discussion required a case study on TrueCrypt, a tool that I had no prior experience with. To prepare, I conducted online research on TrueCrypt. Given its security vulnerabilities and discontinuation, I will not be using TrueCrypt in practice, limiting my knowledge to theoretical understanding.

Phone

-

Address

Mumbai, India