2012
DOI: 10.1007/978-3-642-33167-1_43
|View full text |Cite
|
Sign up to set email alerts
|

Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0
1

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(22 citation statements)
references
References 15 publications
0
21
0
1
Order By: Relevance
“…The same is (even more) true of time(). As such, the only input to the victim PRNG that may be unknown to the adversary is the result of getpid(), which may assume any of 2 16 values. An adversary can initiate a password reset for its own account with the victim web application.…”
Section: Background On Prng In Phpmentioning
confidence: 99%
“…The same is (even more) true of time(). As such, the only input to the victim PRNG that may be unknown to the adversary is the result of getpid(), which may assume any of 2 16 values. An adversary can initiate a password reset for its own account with the victim web application.…”
Section: Background On Prng In Phpmentioning
confidence: 99%
“…The attack has recently been improved to require a median of less than 15 000 chosen ciphertexts on the standard oracle [5]. Instances of the attack in widely-deployed real-world systems continue to be found [23]. Finally, note also that as of version 1.3, RSAES-PKCS1-v1 5 will be dropped from the TLS standard.…”
Section: Scenario Api Symmetric Encryptionmentioning
confidence: 99%
“…This may require some kind of tie between hardware tokens for keys and their operations. Recently, the W3C has been exploring adding hardware token access to the Web Cryptography API in their "Web Cryptography v.Next" workshop, and so the next version of the API may support both secure multisession key storage and cryptographic operations on those keys via some form of a trusted execution environment 22 as well as access via next-generation authentication APIs such as FIDO 23 to origin-bound platform-held keys via call-response requests that do not reveal the secret key material.…”
Section: Fixing the Web Cryptography Apimentioning
confidence: 99%
“…With sufficiently high probability the derived "message" sm mod N is PKCS#1 v1.5 padding compliant. The adversary could thus potentially deduce information about m in case of an error message 12 indicating correct or incorrect padding, and given sufficiently many error messages, recover m. The attack has been significantly improved in a series of papers, e.g., [JSS12,MSWS14].…”
Section: On the Applicability Of Bleichenbacher's Attackmentioning
confidence: 99%