Noon Silk wrote:
From: 
http://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.html

"Here's the postage stamp version: due to a perfect storm of (subtle,
but not novel) cryptographic flaws, an attacker can extract sensitive
keys from several popular cryptographic token devices. This is
obviously not good, and it may have big implications for people who
depend on tokens for their day-to-day security. [...] The more
specific (and important) lesson for cryptographic implementers is: if
you're using PKCS#1v1.5 padding for RSA encryption, cut it out.
Really. This is the last warning you're going to get."

Direct link to the paper:
http://hal.inria.fr/docs/00/70/47/90/PDF/RR-7944.pdf - Efficient
Padding Oracle Attacks on Cryptographic Hardware by Bardou, Focardi,
Kawamoto, Simionato, Steel and Tsay


Thanks for this link.

The paper is self-explanatory, at least to someone who has followed the factoring-based public key cryptography resistance to CCA (chosen ciphertext attack) for a while.

Here is the main theoretical contribution: "At the heart of our techniques is a small but significant theorem that allows not just multiplication (as in the [Bleichenbacher’s well-known attack] attack) but also division to be used to manipulate a PKCS#1 v1.5 ciphertext and learn about the plaintext."

The paper reports findings from extensive experiments with the attacks.

The paper is thus a very significant contribution.

Take care my friends, meaning that is you see yourself as an applied cryptographer, "spot the oracle".

--
- Thierry Moreau

CONNOTECH Experts-conseils inc.
9130 Place de Montgolfier
Montreal, QC, Canada H2M 2A1

Tel. +1-514-385-5691
_______________________________________________
cryptography mailing list
cryptography@randombit.net
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to