I think the IV vulnerability that I’m talking about is more theoretical than an 
actual concern. From what I’ve read the attacker needs to be able to 
control/influence what is being encrypted for knowledge of the next IV to help 
(so they can use a known plain text to test their key hypothesis).

And yes, the IV does make each encrypted message different even for the same 
plain text.

I didn’t fully work out the IV vulnerability but it did make sense how it would 
work.

Thanks,
Brian
On Jul 3, 2018, 2:39 PM -0400, William Prothero <waproth...@gmail.com>, wrote:
> Brian,
> Thank you for your wisdom on this issue. I’m very interested in your 
> recommendations and they are inspiring me to do more Internet research.
>
> Just asking...
> You said that the attacker could figure out the next iv. Since I append the 
> iv to the front of the encrypted data, the attacker will always know the iv, 
> correct? As I understand, the iv is used to obfuscate the encrypted data so 
> it is more difficult for the attacker to decrypt the AES encrypted data. A 
> random iv is used so the attacker can’t get the key by entering specific 
> patterns of data and using the results.
>
> Darn, this is complicated! I can see why there are so many opinions. I read 
> that some folks recommend that the iv be secret and others don’t. When I look 
> at the online discussions on stackoverflow, every comment is responded to 
> with a different suggestion, and I have no idea whether the commenter knows 
> what he/she is talking about. There is also out of date information to 
> contend with. I also remember the horrible bug found in ssh encryption. AES 
> was developed and released November, 2001 and a lot of the discussions are 
> older.
>
> I think the basic thing we hope for is that the attacker doesn’t have the 
> key, and we need to do everything possible to keep it from determining the 
> key. The attacker can still decrypt with a brute force method that tries all 
> possible keys, but that’s probably rare in most cases, but possible.
>
> I will modify the php to generate a new iv for the return data and look into 
> the way I set the randomseed using the milliseconds.
>
> Thanks again,
> Bill
>
> William Prothero
> http://earthlearningsolutions.org
>
> > On Jul 3, 2018, at 9:31 AM, Brian Milby <br...@milby7.com> wrote:
> >
> > I just put the PHP on my server and it was able to handle the randombytes 
> > IV without issue.
> >
> > The demo does not generate a new IV for the returned data which it really 
> > should in production.
> >
> > From a security perspective, you assume that an attacker has access to the 
> > code. From the encrypted message, an attacker could figure out your next IV.
> > > >
_______________________________________________
use-livecode mailing list
use-livecode@lists.runrev.com
Please visit this url to subscribe, unsubscribe and manage your subscription 
preferences:
http://lists.runrev.com/mailman/listinfo/use-livecode

Reply via email to