0 votes

Hi, quick question regarding the Bleichenbacher attack.

In the lecture it was explained that the attack can be used to recover the plaintext of a specific RSA ciphertext by abusing a padding oracle.

However, in the exercise the official solution states that an attacker could also perform “any private key operation with the server's private key” etc.

This seems to contradict the lecture explanation. My understanding was that Bleichenbacher only allows decryption of individual ciphertexts, not general access to private key operations.

Could you clarify which interpretation is correct?

Official solution text:

by
edit history

1 Answer

0 votes
Hello, fellow student here.
As per my understanding from the lecture, they were also able to generate signatures, as signing is basically encryption with the private key, so you won't really have access to the keys themselves, but you can do anything you like with them with the server acting as a proxy.
by
edited
edit history
0
Hi,

This is correct.

However, please keep in mind that the decryption uses the private key.
The encryption uses the public key.

Cheers,
Sebastian