Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

joyrpc存在iv=key的密码误用 #52

Open
cryptochecktool opened this issue Dec 17, 2024 · 0 comments
Open

joyrpc存在iv=key的密码误用 #52

cryptochecktool opened this issue Dec 17, 2024 · 0 comments

Comments

@cryptochecktool
Copy link

一、漏洞摘要

joyrpc中的加密代码使用了IV=key的模式,从而会导致CCA攻击,进而让攻击者获取密钥。

Cipher cp = Cipher.getInstance(cipher);
//初始化,设置为加密模式
cp.init(Cipher.ENCRYPT_MODE, encryptKey(key, cp.getBlockSize()), new IvParameterSpec(key));
return cp.doFinal(source);
}

二、复现步骤:逻辑清晰,步骤严密
截获密文:攻击者截获一段使用IV = Key加密的密文C = (C1, C2, C3, ..., Cn)。
构造特制密文:攻击者构造一个新的密文C' = (C1, 0, C1, C2, C3, ..., Cn),其中0表示一个全零的块。
解密过程:解密C1时,P1 = AES_decrypt(C1, Key) XOR Key。解密第二个块时,P2 = AES_decrypt(0, Key) XOR C1。解密第三个块时,P3 = AES_decrypt(C1, Key) XOR 0。恢复Key:由于P1 = AES_decrypt(C1, Key) XOR Key,且P3 = AES_decrypt(C1, Key),所以P1 XOR P3 = Key。
可以参阅:https://cedricvanrompay.gitlab.io/cryptopals/challenges/27.html

三、修复方案

IV应该设置为随机数。

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant