What are some of the main vulnerabilities when using public key cryptography?

Top Answer : The main vulnerabilities are not generally attacks via cryptanalysis (cracking keys or encrypted traffic via cryptographic analysis).  Typically, instead the main risks are due to errors in applications using public key cryptography and cryptographic libraries based on bad design mistakes and/or implementation errors.  Also such common application security software bugs such as a stack overflow due to a lack of bounds checking (e.g. the HeartBleed vulnerability) can lead to the compromise of cryptographic operations or credentials.

Yellow Terminal
Educational Services
The main vulnerabilities are not generally attacks via cryptanalysis (cracking keys or encrypted traffic via cryptographic analysis).  Typically, instead the main risks are due to errors in applications using public key cryptography and cryptographic libraries based on bad design mistakes and/or implementation errors.  Also such common application security software bugs such as a stack overflow due to a lack of bounds checking (e.g. the HeartBleed vulnerability) can lead to the compromise of cryptographic operations or credentials.
0 upvotes