Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext validity queries

4Citations
Citations of this article
29Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We show that one can recover the PIN from a standardized RSA-based PIN encryption algorithm from a small number of queries to a ciphertext validity checking oracle. The validity checking oracle required is rather special and we discuss whether such oracles could be obtained in the real world. Our method works using a minor extension to the ideas of Bleichenbacher and Manger, in particular we obtain information from negative, as well as positive, responses from the validity checking oracle. © 2010 Springer-Verlag.

Cite

CITATION STYLE

APA

Smart, N. P. (2010). Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext validity queries. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5985 LNCS, pp. 15–25). https://doi.org/10.1007/978-3-642-11925-5_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free