- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
ID: kotlin-security/no-iv-reuse
Language: Kotlin
Severity: Error
Category: Security
CWE: 323
This rule addresses the use of Initialization Vectors (IVs) in counter mode encryption. An Initialization Vector is a random number that is used as the starting point for encryption algorithms. It’s essential to generate fresh IVs for every encryption operation to ensure the output is not predictable, enhancing the overall security of the encryption process.
Using static or hard-coded IVs introduces a significant security risk. If an attacker knows the IV, they can predict the output of the encryption, making it much easier to break. The fundamental principle of cryptography is to keep all aspects of the encryption process as unpredictable as possible.
To adhere to this rule, always generate a fresh, random IV for each encryption operation. This ensures that even if an attacker manages to compromise one encryption operation, subsequent operations remain secure due to the unpredictability of the IVs.
// Noncompliant - Using a static IV
class InsecureEncryption {
fun encryptData(secretKey: String, data: ByteArray): ByteArray {
// BAD: Hardcoded IV that will be reused for every encryption
val staticIV = "staticIVvalue123".toByteArray()
val cipher = Cipher.getInstance("AES/CCM/NoPadding")
val key = SecretKeySpec(secretKey.toByteArray(), "AES")
val paramSpec = CCMParameterSpec(128, staticIV)
cipher.init(Cipher.ENCRYPT_MODE, key, paramSpec)
return cipher.doFinal(data)
}
}
// Compliant - Using a secure random IV
class SecureEncryption {
fun encryptData(secretKey: String, data: ByteArray): ByteArray {
// GOOD: Generate fresh random IV for each encryption
val secureRandom = SecureRandom()
val randomIV = ByteArray(12).apply {
secureRandom.nextBytes(this)
}
val cipher = Cipher.getInstance("AES/CCM/NoPadding")
val key = SecretKeySpec(secretKey.toByteArray(), "AES")
val paramSpec = CCMParameterSpec(128, randomIV)
cipher.init(Cipher.ENCRYPT_MODE, key, paramSpec)
return cipher.doFinal(data)
}
}