Google Confirms Security Compromise in Android Apps Using Java Cryptography Architecture (JCA)

Posted on Wednesday, August 14, 2013 by RICHARD HARRIS, Executive Editor

Today on Google's Developer blog, Alex Klyubin, Android Security Engineer confirms they have found a serious security compromise in Android apps that use JCA for certain functions such as key generation and signing, or random number generation.


Alex says, 'We have now determined that applications which use the Java Cryptography Architecture (JCA) for key generation, signing, or random number generation may not receive cryptographically strong values on Android devices due to improper initialization of the underlying PRNG. Applications that directly invoke the system-provided OpenSSL PRNG without explicit initialization on Android are also affected. Applications that establish TLS/SSL connections using the HttpClient and java.net classes are not affected as those classes do seed the OpenSSL PRNG with values from /dev/urandom.'

Also in the blog post are a couple of things Android developers can do to make sure their apps are secure.

More App Developer News

Buildbox 4 AI turns game ideas into reality faster than ever



Odeeo hires Spotify executive James Cowan



ATT user opt in insights from AppsFlyer



Social engineering takeover attacks are on the rise



Epic Games defeats Google in court



Copyright © 2024 by Moonbeam Development

Address:
3003 East Chestnut Expy
STE# 575
Springfield, Mo 65802

Phone: 1-844-277-3386

Fax:417-429-2935

E-Mail: contact@appdevelopermagazine.com