Score:0

Is CBC mode of encryption still safe as long as it's not use to send messages over a network?

ly flag

I'm still reading about the Padding Oracle attack and Side Channel attack that can be performed to decrypt cipher text encrypted with CBC though it's still not clear to me.

But base on my little knowledge and understanding, all of this attacks can only be performed over the internet right???

Let's say I created a program that encrypt files in my computer/local drive and I used the CBC mode of encryption to protect it.

  1. If someone gain physical access to my computer will they be able to use those said attacks to decrypt my files?

  2. Let's say they were able to copy the encrypted files and the encryption program that uses CBC into a USB stick but not the key, then they go home transfer it on their own computer. will they be able to decrypt the files on their own computer?

kelalaka avatar
in flag
[Data on rest has no padding oracle attack](https://crypto.stackexchange.com/a/72445/18298) 1. No, 2. Not clear, do you mean they have only access to USB? Side-Channel can be executed everywhere, however, once an attacker has access to your machine they will not spend time for side-channel.
kabibe sadagat avatar
ly flag
@kelalaka for no. 2 I mean like for example someone break into your house and copied the encrypted files in your computer(for some weird cases where you leave it on) along with the program you used, with the hope of decrypting it on their own computer.
kelalaka avatar
in flag
AES-128/256, ChaCha20-256 is for from bruteforce for your case and CBC has Ind-CPA if [you properly used](https://crypto.stackexchange.com/a/57648/18298). Why don't you use VeraCrypt to solve all of your issues at once?
Score:2
in flag
  1. If someone gain physical access to my computer will they be able to use those said attacks to decrypt my files?

No, there needs to be an active implementation of AES for these attacks to work; unless the attacker can startup a service that acts on the plaintext or ciphertext data, padding and side channel attacks are not possible.

  1. Let's say they where able to copy the encrypted files and the encryption program that uses CBC on a USB stick but not the key. will they have chances of decrypting the files?

No, padding oracle attacks are not possible without the key. It says nothing about the plaintext if an unpadding error occurs when using the wrong key. Side channel attacks are commonly used to get to the key value, but here the same problem occurs, having information about the foreign key or decryption with the foreign key will not give any indication of either plaintext or the key.


Notes:

  • Padding oracle attacks are part of a family of plaintext oracle attacks; both of them obviously require a decryption oracle to work.
  • On the other hand, side channel attacks are themselves a family of attacks; what you are alluding to seems to be side channel attacks based on response time; other attacks are e.g. attacks based on (differential) power usage.
  • Plaintext oracle attacks simply require the oracle: any active component that is willing to decrypt and leak enough information about the plaintext for more of the plaintext to become available; they don't necessarily require the Internet - any connection would suffice, the faster the better.
  • The same basically goes for side channel attacks; any information retrieved from the cipher operation that is related to the key (or, less commonly, the plaintext) could convey information to the attacker; the more access to the cipher operation the better.
mangohost

Post an answer

Most people don’t grasp that asking a lot of questions unlocks learning and improves interpersonal bonding. In Alison’s studies, for example, though people could accurately recall how many questions had been asked in their conversations, they didn’t intuit the link between questions and liking. Across four studies, in which participants were engaged in conversations themselves or read transcripts of others’ conversations, people tended not to realize that question asking would influence—or had influenced—the level of amity between the conversationalists.