Re: [cryptography] non-decryptable encryption

2012-07-05 Thread Givonne Cirkin
Thanks for all those who gave constructive criticism. The revised article is available at Cornell's archive: http://arxiv.org/abs/0912.4080 Givon _ You @ 37.com - The world's easiest free Email address ! _

Re: [cryptography] Key extraction from tokens (RSA SecurID, etc) via padding attacks on PKCS#1v1.5

2012-07-05 Thread Nico Williams
On Thu, Jul 5, 2012 at 9:17 AM, Martin Paljak wrote: > On Tue, Jul 3, 2012 at 1:56 AM, Michael Nelson wrote: >> It also does not matter whether you are using pkcs11 APIs, and whether you >> are doing key wrap/unwrap, and whether the data is a key. Any secret piece >> of data encrypted under an

Re: [cryptography] Key extraction from tokens (RSA SecurID, etc) via padding attacks on PKCS#1v1.5

2012-07-05 Thread Martin Paljak
Hello, On Tue, Jul 3, 2012 at 1:56 AM, Michael Nelson wrote: > If the target HSM notices that the encrypted blob is corrupted, then it will > give you an error message. This is a leak of information, but that's life. > Normally such a covert channel would at most help you to mount a brute for