Bleichenbacher’s Attack Strikes again: Breaking PKCS#1 v1.5 in XML Encryption

作者: Tibor Jager , Sebastian Schinzel , Juraj Somorovsky

DOI: 10.1007/978-3-642-33167-1_43

关键词:

摘要: We describe several attacks against the PKCS#1 v1.5 key transport mechanism of XML Encryption. Our allow to recover secret used encrypt transmitted payload data within a few minutes or hours, depending on considered scenario.

参考文章(31)
Yongge Wang, Public Key Cryptography Standards: PKCS arXiv: Cryptography and Security. ,(2012)
Aggelos Kiayias, Moti Yung, Self Protecting Pirates and Black-Box Traitor Tracing international cryptology conference. pp. 63- 79 ,(2001) , 10.1007/3-540-44647-8_4
Donald Eastlake, None, XML Encryption Syntax and Processing W3C Recommendation. ,(2003)
Aurélie Bauer, Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Damien Vergnaud, On the broadcast and validity-checking security of PKCS#1 v1.5 encryption applied cryptography and network security. ,vol. 6123, pp. 1- 18 ,(2010) , 10.1007/978-3-642-13708-2_1
Romain Bardou, Riccardo Focardi, Yusuke Kawamoto, Lorenzo Simionato, Graham Steel, Joe-Kai Tsay, Efficient Padding Oracle Attacks on Cryptographic Hardware international cryptology conference. ,vol. 2012, pp. 608- 625 ,(2012) , 10.1007/978-3-642-32009-5_36
Nigel P. Smart, Errors matter: breaking RSA-Based PIN encryption with thirty ciphertext validity queries the cryptographers track at the rsa conference. pp. 15- 25 ,(2010) , 10.1007/978-3-642-11925-5_2
Billy B. Brumley, Manuel Barbosa, Dan Page, Frederik Vercauteren, Practical Realisation and Elimination of an ECC-Related Software Bug Attack Lecture Notes in Computer Science. ,vol. 7178, pp. 171- 186 ,(2012) , 10.1007/978-3-642-27954-6_11
Cryptographic Hardware and Embedded Systems - CHES 2003 Lecture Notes in Computer Science. ,vol. 2779, ,(2003) , 10.1007/978-3-540-45238-6
Aggelos Kiayias, Moti Yung, Traitor Tracing with Constant Transmission Rate international cryptology conference. pp. 450- 465 ,(2002) , 10.1007/3-540-46035-7_30