scispace - formally typeset
Open Access

Padding Oracle Attacks on Cryptographic Hardware

About
The article was published on 2012-01-01 and is currently open access. It has received 0 citations till now. The article focuses on the topics: Padding oracle attack & Optimal asymmetric encryption padding.

read more

References
More filters
Journal Article

Security flaws induced by CBC padding -applications to SSL, IPSEC, WTLS …

TL;DR: Various ways to perform an efficient side channel attack are shown and potential applications, extensions to other padding schemes and various ways to fix the problem are discussed.

SP 800-38A 2001 edition. Recommendation for Block Cipher Modes of Operation: Methods and Techniques

TL;DR: This recommendation defines five confidentiality modes of operation for use with an underlying symmetric key block cipher algorithm: Electronic Codebook (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR).
Book ChapterDOI

Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS ...

TL;DR: In this paper, the authors discuss potential applications, extensions to other padding schemes, and various ways to fix the problem of side channel leakage from communication protocols in chosen ciphertext attacks since the receiver usually sends an acknowledgment or an error message.
Book ChapterDOI

A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0

TL;DR: In this article, an adaptive chosen ciphertext attack against PKCS #1 v20 RSA OAEP encryption is described, which recovers the plaintext -not the private key - from a given ciphertext in a little over log 2 n queries of an oracle implementing the algorithm, where n is the RSA modulus.
Journal Article

A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0

TL;DR: An adaptive chosen ciphertext attack against PKCS #1 v2.0 RSA OAEP encryption is described, which recovers the plaintext from a given ciphertext in a little over log2 n queries of an oracle implementing the algorithm.
Related Papers (5)