This post is part of a series about bad cryptography usage . We all rely heavily on cryptographic algorithms for data confidentiality and integrity, and although most commonly used algorithms are secure, they need to be used carefully and correctly. Just as holding a hammer backwards won't yield the expected result, using cryptography badly won't yield the expected results either.
more here............http://blog.ioactive.com/2014/10/bad-crypto-101.html
more here............http://blog.ioactive.com/2014/10/bad-crypto-101.html