RSA PKCS#1 tests

38 views
Skip to first unread message

juraj.so...@gmail.com

unread,
Jan 4, 2017, 7:16:03 PM1/4/17
to wycheproof-users
According to the public pull requests, you have some internal work done with additional test cases.

Are your RSA PKCS1 test cases already implemented? If not, I could add some from our previous papers, for example:
https://github.com/RUB-NDS/TLS-Attacker/blob/master/Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/pkcs1/PKCS1VectorGenerator.java

...I just wanted to omit unnecessary work.

thanks
Juraj

Daniel Bleichenbacher

unread,
Jan 5, 2017, 6:57:05 AM1/5/17
to juraj.so...@gmail.com, wycheproof-users
I don't have additional test cases for RSA PKCS #1 encryption.
The goal of the tests so far is rather small: An implementation of PKCS #1 encryption should not
be much more vulnerable to chosen ciphertext attacks than PKCS #1.
Bugs that occur with low probability are currently not caught.

Of course test vectors would be welcome.





--
You received this message because you are subscribed to the Google Groups "wycheproof-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to wycheproof-users+unsubscribe@googlegroups.com.
To post to this group, send email to wycheproof-users@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/wycheproof-users/f22b434f-869b-4a62-8f7b-a5e78400f5cf%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply all
Reply to author
Forward
0 new messages