pgpfan:ledowngrade
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revision | |||
| pgpfan:ledowngrade [2025/11/05 16:36] – [An Unwarranted Claim Against SEIPD (OCFB-MDC)] b.walzer | pgpfan:ledowngrade [2025/12/10 16:27] (current) – [Stacked Vulnerabilities] Bad wording, spelling b.walzer | ||
|---|---|---|---|
| Line 71: | Line 71: | ||
| As has been pointed out(([[https:// | As has been pointed out(([[https:// | ||
| - | The vulnerabilties | + | The vulnerabilities |
| That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | That is literally what is happening here. The attack from the paper requires that the user or the user's client receive a message, decrypt it and then send it back to the attacker. For this case there is no point in worrying about the second vulnerability before resolving the first. Once you have resolved the first then the second goes away. All that cool stuff about using an decryption function as a encryption function never has a chance to be meaningful. So it seems that there is no attack here against the LibrePGP OCB mode that could ever be considered significant in some way. | ||
pgpfan/ledowngrade.1762360587.txt.gz · Last modified: by b.walzer
