Abstract

■ Scientists from the ca’ Foscari University of Venice, the University of Birmingham, Google, and the Norwegian University of Science and Technology designed a cyberattack that took only 13 minutes to steal the keys from RSA’s SecurID 800 token fob. They say their exploit could also compromise additional devices that store RSA keys, including other companies’ tokens and national identification cards. The padding oracle attack repeatedly exploits a weakness in the cryptographic wrapper until contents convert into plaintext.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call