IETF-SSH archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: a more detailed analysis of "known IV" vulnerability.
Wei Dai <weidai%eskimo.com@localhost> writes:
> 2. By opening 2^24 channels, the attacker can gain control over 8 more
> bits of the plaintext for 8-byte block size, and 24 more bits for 16-byte
> block size.
Do implementations allow that? My implementation has an arbitrary
limit of 2^17 channels per connection. (And channel numbers are
allocated sequentially).
/Niels
Home |
Main Index |
Thread Index |
Old Index