|
Message-ID: <1319114047.31111.3.camel@scapa>
Date: Thu, 20 Oct 2011 14:34:07 +0200
From: Yves-Alexis Perez <corsac@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: PR attack against XML Encryption
On jeu., 2011-10-20 at 12:58 +0200, Florian Weimer wrote:
> A German university has released a press release, alleging a
> vulnerability in the W3C XML Encryption standard. Apparently, error
> reporting from existing implementations can be used as an oracle to
> recover information from messages encrypted in CBC mode.
>
> Details have not been published, as far as I know. Does anybody know
> more?
Paper was just presented at ACM CCS
(http://www.sigsac.org/ccs/CCS2011/paper_list.shtml). Proceedings are
available at
http://dl.acm.org/citation.cfm?id=2046756&dl=ACM&coll=DL&CFID=61633880&CFTOKEN=38378828
but afaict the paper is not (yet?) available freely.
Regards,
--
Yves-Alexis
Download attachment "signature.asc" of type "application/pgp-signature" (837 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.