IETF-SSH archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: a more detailed analysis of "known IV" vulnerability.



Wei Dai <weidai%eskimo.com@localhost> writes:

> 2. By opening 2^24 channels, the attacker can gain control over 8 more
> bits of the plaintext for 8-byte block size, and 24 more bits for 16-byte
> block size.

Do implementations allow that? My implementation has an arbitrary
limit of 2^17 channels per connection. (And channel numbers are
allocated sequentially).

/Niels



Home | Main Index | Thread Index | Old Index