On Fri, 29 Oct 2021 06:07:26 GMT, Lari Hotari <d...@openjdk.java.net> wrote:

>> For anyone interested, there's an explanation of the [Bleichenbacher's CCA 
>> attack on PKCS#1 v1.5 on 
>> Stackexchange](https://crypto.stackexchange.com/questions/12688/can-you-explain-bleichenbachers-cca-attack-on-pkcs1-v1-5).
>>  The original paper is ["Chosen Ciphertext Attacks Against Protocols Based 
>> on the RSA Encryption Standard PKCS #1" 
>> ](http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf).
>> 
>> The reason for constant time is to not leak information about a possible bad 
>> padding to the attacker based on the difference in response time between a 
>> valid and bad padding. The attacker can use this information to narrow the 
>> search to find the pre-master secret.
>
>> Hi @lhotari, please submit an OCA at https://oca.opensource.oracle.com/ if 
>> you are contributing on your own behalf. If you are contributing on your 
>> employers behalf, please send me an e-Mail at 
>> [dalibor.to...@oracle.com](mailto:dalibor.to...@oracle.com) so that I can 
>> verify your account.
> 
> @robilad This is a contribution on my own behalf. I have signed [OCA in 2014 
> while contributing to 
> Btrace](https://github.com/btraceio/btrace/pull/101#issuecomment-63333404). 
> Is that sufficient? I cannot sign OCA again online, it gives me an error 
> message "The provided GitHub username lhotari does already appear in an 
> existing OCA, please use another one.".

@lhotari I think you have got the reason to create the BadPaddingExceptions.  
Did you want to close this bug, or fix it alternativey without break the 
constant-time purpose?

-------------

PR: https://git.openjdk.java.net/jdk/pull/5581

Reply via email to