On the broadcast and validity-checking security of PKCS#1 v1.5 encryption

7Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper describes new attacks on PKCS#1 v1.5, a deprecated but still widely used RSA encryption standard. The first cryptanalysis is a broadcast attack, allowing the opponent to reveal an identical plaintext sent to different recipients. This is nontrivial because different randomizers are used for different encryptions (in other words, plaintexts coincide only partially). The second attack predicts, using a single query to a validity checking oracle, which of two chosen plaintexts corresponds to a challenge ciphertext. The attack's success odds are very high. The two new attacks rely on different mathematical tools and underline the need to accelerate the phase out of PKCS#1 v1.5. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Bauer, A., Coron, J. S., Naccache, D., Tibouchi, M., & Vergnaud, D. (2010). On the broadcast and validity-checking security of PKCS#1 v1.5 encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6123 LNCS, pp. 1–18). https://doi.org/10.1007/978-3-642-13708-2_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free