We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
一、漏洞摘要
joyrpc中的加密代码使用了IV=key的模式,从而会导致CCA攻击,进而让攻击者获取密钥。
joyrpc/joyrpc-core/src/main/java/io/joyrpc/codec/crypto/aes/AesCrypto.java
Lines 45 to 49 in ff7bbce
三、修复方案
IV应该设置为随机数。
The text was updated successfully, but these errors were encountered:
No branches or pull requests
一、漏洞摘要
joyrpc中的加密代码使用了IV=key的模式,从而会导致CCA攻击,进而让攻击者获取密钥。
joyrpc/joyrpc-core/src/main/java/io/joyrpc/codec/crypto/aes/AesCrypto.java
Lines 45 to 49 in ff7bbce
二、复现步骤:逻辑清晰,步骤严密
截获密文:攻击者截获一段使用IV = Key加密的密文C = (C1, C2, C3, ..., Cn)。
构造特制密文:攻击者构造一个新的密文C' = (C1, 0, C1, C2, C3, ..., Cn),其中0表示一个全零的块。
解密过程:解密C1时,P1 = AES_decrypt(C1, Key) XOR Key。解密第二个块时,P2 = AES_decrypt(0, Key) XOR C1。解密第三个块时,P3 = AES_decrypt(C1, Key) XOR 0。恢复Key:由于P1 = AES_decrypt(C1, Key) XOR Key,且P3 = AES_decrypt(C1, Key),所以P1 XOR P3 = Key。
可以参阅:https://cedricvanrompay.gitlab.io/cryptopals/challenges/27.html
三、修复方案
IV应该设置为随机数。
The text was updated successfully, but these errors were encountered: