Module 2
Secure Software Development (Computer Science)
Unit 8
Cryptography and Its Use in Operating Systems
Learning Outcomes
- Describe some of the issues encountered with cryptographic libraries.
- Explain the pros and cons of using common cryptographic libraries.
- Demonstrate the use of cryptographic libraries in a simple application.
e-Portfolio Component: Collaborative Discussion 2: Cryptography case study - TrueCrypt
-
A discussion was started answering the below questions.
Furthermore, an ontology design capturing the weaknesses of
TrueCrypt according to their severity was presented. Questions:
- The (anonymous) TrueCrypt authors have said “Using TrueCrypt is not secure as it may contain unfixed security issues” (TrueCrypt, 2014). Does the cryptanalysis provided above prove or disprove this assumption?
- Would you be prepared to recommend TrueCrypt to a friend as a secure storage environment? What caveats (if any) would you add?
- Link to the discussion forum's post: here
Reflection
- Unit 8 was relatively less demanding. The collaborative discussion required a case study on TrueCrypt, a tool that I had no prior experience with. To prepare, I conducted online research on TrueCrypt. Given its security vulnerabilities and discontinuation, I will not be using TrueCrypt in practice, limiting my knowledge to theoretical understanding.