This repository has been archived by the owner on Jan 9, 2018. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 51
Unauthenticated encryption is vulnerable to chosen ciphertext attacks, bitflipping attacks #12
Comments
Is that something, that we can avoid using Random IV? |
No, failure to use a random IV (#4) is a separate, unrelated, but still very bad problem. |
@tarcieri Thanks for the info. |
FYI, in case you're trying to follow the same path as me:
|
I'm just sad it took me four years to figure out that this path works just fine... ugh. It should not have surprised me. |
@jfinkhaeuser That web form is a new thing created this year, in response to MITRE failing to issue IDs in a timely fashion via e-mail. |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
This gem is using an unauthenticated encryption mode (CBC) which is vulnerable to chosen ciphertext attacks (i.e. it is not IND-CCA secure)
This is a serious issue which can allow active attackers to completely recover message plaintexts. It also allows attackers to make undetectable alterations to the plaintext.
At the very minimum you should add HMAC in an encrypt-then-MAC construction.
The text was updated successfully, but these errors were encountered: