A really good post here. Follow the link and read the long version....

http://blog.cryptographyengineering.com/2012/06/bad-couple-of-years-for-cryptographic.html

There was a time just a few weeks ago when it seemed like the CRYPTO
2012 accepted papers list might not be posted in time for, well,
CRYPTO 2012. Fortunately the list is public now, which means (1) we've
avoided the longest rump session in the history of cryptography, and
(2) I get to tell you about a particularly neat paper.

The paper in question is 'Efficient Padding Oracle Attacks on
Cryptographic Hardware' by Bardou, Focardi, Kawamoto, Simionato, Steel
and Tsay. This is a typically understated academic title for a
surprisingly nifty result.

Here's the postage stamp version: due to a perfect storm of (subtle,
but not novel) cryptographic flaws, an attacker can extract sensitive
keys from several popular cryptographic token devices. This is
obviously not good, and it may have big implications for people who
depend on tokens for their day-to-day security. If that describes you,
I suggest you take a look at this table:

[Table (Inline Image) Removed]

That's the headline news, anyway. The more specific (and important)
lesson for cryptographic implementers is: if you're using PKCS#1v1.5
padding for RSA encryption, cut it out. Really. This is the last
warning you're going to get.

So much for the short version. Keep reading for the long one.
…

-- 
You received this message because you are subscribed to the "Crypto++ Users" 
Google Group.
To unsubscribe, send an email to [email protected].
More information about Crypto++ and this group is available at 
http://www.cryptopp.com.

Reply via email to