We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
在你的代码:
pmhub/pmhub-base/pmhub-base-notice/src/main/java/com/laigeoffer/pmhub/base/notice/utils/AES256Utils.java
Lines 48 to 52 in cc19569
三、修复方案 IV应该设置为随机数,然后拼接在密文前面。 解密使再取下来即可。
The text was updated successfully, but these errors were encountered:
No branches or pull requests
在你的代码:
pmhub/pmhub-base/pmhub-base-notice/src/main/java/com/laigeoffer/pmhub/base/notice/utils/AES256Utils.java
Lines 48 to 52 in cc19569
中使用了IV=KEY。
攻击方案:
截获密文:攻击者截获一段使用IV = Key加密的密文C = (C1, C2, C3, ..., Cn)。
构造特制密文:攻击者构造一个新的密文C' = (C1, 0, C1, C2, C3, ..., Cn),其中0表示一个全零的块。
解密过程:解密C1时,P1 = AES_decrypt(C1, Key) XOR Key。解密第二个块时,P2 = AES_decrypt(0, Key) XOR C1。解密第三个块时,P3 = AES_decrypt(C1, Key) XOR 0。恢复Key:由于P1 = AES_decrypt(C1, Key) XOR Key,且P3 = AES_decrypt(C1, Key),所以P1 XOR P3 = Key。
可以参阅:https://cedricvanrompay.gitlab.io/cryptopals/challenges/27.html
三、修复方案
IV应该设置为随机数,然后拼接在密文前面。
解密使再取下来即可。
The text was updated successfully, but these errors were encountered: