Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries

Research output: Chapter in Book/Report/Conference proceedingConference Contribution (Conference Proceeding)

4 Citations (Scopus)

Abstract

We show that one can recover the PIN from a standardized RSA-based PIN encryption algorithm from a small number of queries to a ciphertext validity checking oracle. The validity checking oracle required is rather special and we discuss whether such oracles could be obtained in the real world. Our method works using a minor extension to the ideas of Bleichenbacher and Manger, in particular we obtain information from negative, as well as positive, responses from the validity checking oracle.
Translated title of the contributionErrors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries
Original languageEnglish
Title of host publicationTopics in Cryptology - CT-RSA 2010
PublisherSpringer Berlin Heidelberg
Pages15-25
Volume5985
Publication statusPublished - 2010

Bibliographical note

ISBN: 9783642119248
Publisher: Springer Verlag LNCS 5985
Name and Venue of Conference: Topics in Cryptology - CT-RSA 2010
Other identifier: 2001153

Fingerprint Dive into the research topics of 'Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries'. Together they form a unique fingerprint.

  • Cite this