Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It's an extension of the chosen-plaintext attack, and so requires the attacker to be able to send custom text that they know is in the encrypted payload. If the unencrypted payload is "our-secret-data :::: some user specified text", then the attacker can eventually determine the contents of our-secret-data by observing how the size of the encrypted response changes as they change the text when the compression step matches up with a part of the secret data. It can be defeated by adding random-length padding after compression and before the encryption step, though.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: