Cryptographic Vulnerabilities

The cluster centers on discussions of specific cryptographic attacks and vulnerabilities, such as DUHK, DROWN, padding oracles, and SHA collisions, with debates on their practicality, novelty, historical context, and whether they stem from protocols or implementations.

➡️ Stable 0.6x Security
3,527
Comments
20
Years Active
5
Top Authors
#8241
Topic ID

Activity Over Time

2007
1
2008
22
2009
51
2010
83
2011
85
2012
108
2013
276
2014
245
2015
267
2016
251
2017
296
2018
249
2019
205
2020
250
2021
246
2022
198
2023
233
2024
211
2025
229
2026
23

Keywords

US SRP BEAST SSH krackattacks.com MITM RSA DNS openwall.com SQL vulnerability attack attacks vulnerabilities blank paper key token bug crypto

Sample Comments

runesoerensen Oct 23, 2017 View on HN

Matthew Green also wrote a blog post about this https://blog.cryptographyengineering.com/2017/10/23/attack-o...

twox2 Aug 11, 2021 View on HN

Doesn't the key compromise make it even less of a protocol hack?

mik1998 Mar 25, 2024 View on HN

"could", theoretically. In practice, there has never been an observed exploitation of the supposed vulnerability.mitigations=off

NeonNautilus Oct 12, 2024 View on HN

Can anyone else prove this security vulnerability actually existed?

tleb_ Apr 2, 2020 View on HN

Probably related to this https://shattered.io/

hackinthebochs Apr 9, 2018 View on HN

How was it demonstrated not to be secure?

tptacek Jul 16, 2010 View on HN

Everyone who reads HN is smart enough to simply read the primary source for this:http://lists.openid.net/pipermail/openid-security/2010-July/...Follow the thread. Nate is Root Labs, Taylor works for him. This is the same vulnerability as Nate found in Google Keyczar last year, and that Coda Hale found in Rails several months ago.Until people start handling crypto flaws the same way we ha

moosingin3space Dec 12, 2017 View on HN

Does this attack affect the security of RSA-based SSH keys, or is it TLS-only?

jvdh Oct 15, 2014 View on HN

This is exploitable now. Padding oracles have been found before, and are even homework assignments of the Coursera cryptography course. The specifics of this bug make it a little bit harder but the paper explains how to work around this. Expect this bug to be exploited in the wild since minutes after (or perhaps already before) the release.

JeremyBanks Feb 27, 2018 View on HN

More or less, yes. This is a known minor weakness in the protocol. See https://arxiv.org/abs/1311.0243