Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Study: consider removing support for RSAv1 encryption entirely #8394

Open
mpg opened this issue Oct 19, 2023 · 0 comments
Open

Study: consider removing support for RSAv1 encryption entirely #8394

mpg opened this issue Oct 19, 2023 · 0 comments

Comments

@mpg
Copy link
Contributor

mpg commented Oct 19, 2023

RSA PKCS#1 v1.5 encryption is a fairly old asymmetric encryption scheme, with a number of pitfalls in implementation and use, most notably the Bleichenbacher attack and new variants of it that keep being published - the latest in date being the Marvin attack.

In 1998 a superior replacement (RSA OAEP) was standardized in PKCS#1 v2.0, which has been recommended ever since.

The only place in Mbed TLS still using RSAv1 encryption is the non-foward-secure RSA key exchanges in TLS 1.2 which are already candidates for removal in 4.0.

The proposal here is to remove support for RSAv1 from PSA crypto as well. (We could just remove the built-in implementation and still allow people to add a driver for it if they're confident they can implement it and use it securely.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Mbed TLS 4.0 SHOULD
Development

No branches or pull requests

1 participant