Paper 2024/1110

Legacy Encryption Downgrade Attacks against LibrePGP and CMS

Falko Strenzke, MTG AG
Johannes Roth, MTG AG
Abstract

This work describes vulnerabilities in the specification of AEAD modes and Key Wrap in two cryptographic message formats. Firstly, this applies to AEAD packets as introduced in the novel LibrePGP specification that is implemented by the widely used GnuPG application. Secondly, we describe vulnerabilities in the AES-based AEAD schemes as well as the Key Wrap Algorithm specified in the Cryptographic Message Syntax (CMS). These new attacks exploit the possibility to downgrade AEAD or AES Key Wrap ciphertexts to valid legacy CFB- or CBC-encrypted related ciphertexts and require that the attacker learns the content of the legacy decryption result. This can happen in two principal ways: either due to the human recipient returning the decryption output to the attacker as a quote or due to a programmatic decryption oracle in the receiving system that reveals information about the plaintext. The attacks effect the decryption of low-entropy plaintext blocks in AEAD ciphertexts and, in the case of LibrePGP, also the manipulation of existing AEAD ciphertexts. For AES Key Wrap in CMS, full key decryption is possible. Some of the attacks require multiple successful oracle queries. The attacks thus demonstrate that CCA2 security is not achieved by the LibrePGP and CMS AEAD or Key Wrap encryption in the presence of a legacy cipher mode decryption oracle.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
AEADdowngradeCMSLibrePGPdecryption-oracle
Contact author(s)
fstrenzke @ cryptosource de
johannes roth @ mtg de
History
2025-04-09: revised
2024-07-08: received
See all versions
Short URL
https://ia.cr/2024/1110
License
Creative Commons Attribution-ShareAlike
CC BY-SA

BibTeX

@misc{cryptoeprint:2024/1110,
      author = {Falko Strenzke and Johannes Roth},
      title = {Legacy Encryption Downgrade Attacks against {LibrePGP} and {CMS}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1110},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1110}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.